Monday, September 30, 2019

E-business and e-commerce web applications Essay

Identify e-business and e-commerce web applications to support the proposed implementation First off e-commerce is one of the best things for business whether you have your whole business through the web or partly. If you have a physical store, you are limited by the area that you can sell your product or offer service. An ecommerce website opens your business to the world. In addition to these two drivers,online retail is also driven by traffic from search engines. One of the most important positives of ecommerce is the lowered cost. A part of these lowered costs could be passed on to customers in the form of discounted prices. Advertising and marketing is global and you get a better buying market. For personnel use the automation of checkout, billing, payments, inventory management, and other operational processes, lowers the number of employees required to run an ecommerce setup. Last but not least Real estate, the store does not need a prominent physical location. you can Locate the Product Quicker, eliminate travel time and cost, provide comparison shopping, also cross reference deals, bargains, coupons, and group buying.if you do open a e-business vulnerabilities that need to be taken into account if you decide to create an e-commerce site is security internal and external. Hackers attempting to steal customer information or disrupt the site or server containing customer information that is stolen. Also Imposters can mirror your ecommerce site to steal customer’s money. authorized administrators/users of an ecommerce website downloading hidden active content need to watch the attacks on ecommerce system. Scans should be frequently done on your server. this will help identify any malicious programs that may be running worms, viruses or Trojan horses. Limited user access will ensure that you know exactly who has access to your ecommerce system and ass ign each user with unique access authentication method.

Sunday, September 29, 2019

Proposal Management at Kudler Fine Foods

The objective of the auditing is to gain the understanding business functions and evaluation of Kudler Fine Foods’ business. Hence the auditing is linked with accounts, volume of transactions processed, systems and processes utilized in the operations etc. The audit may be internal or external. The internal audit is performed to regulate internal control and evaluation whereas the external audit is mandatory as per the statutory regulations.As such the internal auditor access and review the correspondence files, budgetary information, organizational charts, job descriptions, evaluation of internal controls. In this regard, the auditor makes internal report along with deficiencies notices. The audit may be statutory or internal, yet several types of audits exist. As far as Kudler Fine Foods, the related audits are Financial Audits, operational Audits, Department Reviews, Information System Audit, Investigative Audits, Follow-up Audit etc.The financial Audit is historically orie nted and independent evaluation is performed so that fairness, accuracy, reliability of financial data is expressed. The gFinancial Audit is mandatory. With respect to the Operational Audit, it is future-oriented and evaluation of organizational activities. The primary source of the financial audit is operational policies and achievements that are related to the organizational objectives. However financial data may be utilized for the purpose and internal controls/efficiencies can be evaluated during operational audit.The Department Review is linked with the current period analysis of administrative functions in order to evaluate adequacy of controls, safeguarding of assets, proper use of resources, statutory compliances etc. The Information System Audit allows to analysis of General Control Review, Application Controls Review and System Development Review. Follow-up Audit is not mandatory, yet such type of follow-up Audit is conducted after six months of internal/external audit rep ort has been issued. The Follow-up audits are designed to evaluate corrective action that has been taken in connection with issues reported in the Audit Reports.

Saturday, September 28, 2019

Human Infections in the Year 2009 Essay Example | Topics and Well Written Essays - 3250 words

Human Infections in the Year 2009 - Essay Example These impacts could range from just interfering to the normal metabolic functions of the host organisms to the instant cause of death to the host. There are many types of infection in the human contexts such as parasitic, bacterial, or viral infections. Many of these infections caused many human lives throughout the ages. From the bubonic plague to the acquired immune deficiency syndrome, infections played an important involvement in humans' history, religion, and evolution. The breakthrough of the microscope gave way to the discovery of microorganisms. There are two types of cell that could be found in the living world, the prokaryotic and the eukaryotic cells. Prokaryotic cells are primarily characterized by the absence of nuclear membrane within the cell while eukaryotic cells have nuclear membrane that separates the deoxyribonucleic acid (DNA) from the other organelles in the cytoplasm of the cell. Bacteria are microorganisms believed to be the first life forms on earth. Prokaryotes could be eubacteria or true bacteria, or archaebacteria. The difference between eubacteria and archaebacteria are the absence of muramic acid in the cell wall of archaebacteria, the presence of ester linkage between lipids in eubacterial cell membrane and ether linkage in archaebacteria, the different structural types of ribonucleic acid (RNA) polymerase present between the two, the resistance of archaebacteria to chloramphenicol, streptomycin, and kanamycin, and the hig h tolerance of archaebacteria to strive in extreme physico-chemical factors of environments such as hot or cold temperature, high salinity, and others as compared to eubacteria. Furthermore, some other differences between prokaryotes and eukaryotes are the presence of cell wall in most prokaryotes which is composed of mucopeptide, and polysaccharide protein, while, most eukaryotic cell wall is polysaccharide. The absence of mitochondria and chloroplast organelle in prokaryotes is also observed. The presence of plasmids- a circular extra-chromosomal double stranded DNA capable of self replicating and could transfer genetic information to nuclear DNA for the cellular survival- in prokaryotes is commonly observed although some eukaryotes could have plasmids, the occurrences are very rare. The ability of prokaryotes to reduce sulfur, fix atmospheric nitrogen to N2, produce their own food with the utilization of inorganic nutrients, and the ability to store poly-B-hydroxybutyrate (PHB) is detected (Pandolfi et al. 2007). Among the infections known to science, the bacterial infections are the most common. Different kinds of diseases are caused by different kinds of bacteria. Eubacteria or true bacteria or simply bacteria could be classified into groups through their shapes, sizes and staining technique used to view them. There are six basis of classifying bacteria. These are shape, Gram reaction, atmosphere, spores, biochemistry, and serology test. Bacterial shape could be cocci, spiral, or bacilli. Cocci are spherical, bacilli are long and thin shape, and spiral could vary in wavelength and curve. On the other hand, classifying bacteria through Gram reaction is based on its cell wall properties. The Gram reaction could result to Gram-negative or

Friday, September 27, 2019

Wind energy in Washington Essay Example | Topics and Well Written Essays - 250 words

Wind energy in Washington - Essay Example This brief one page paper will seek to consider both the positive and negative aspects of wind turbine arrays and the means by which the communities that house them integrate with their presence. As has previously been noted, the rate of growth and expansion of renewable energy has skyrocketed within the last few years. As such, the prevalence and use of wind power in various populated regions around the United States has also increased. Although these alternative sources of energy account for less than 1% of current energy needs within the United States, they are nonetheless visible and provide a stark contrast to the otherwise unmolested natural environment that oftentimes existed prior to their installation. Although many environmentalists are happy to have such wind farms in operation, there is a strong level of pushback that exists with regards to the adulteration of key environment as well as a definite contingent of individuals that view such wind farms as something of an eyesore. Conversely, other environmentalists view alternative energy as a necessary means of preserving the planet and are willing to relinquish some aesthetic beauty for progress (Henderson 1). Although both sides have a valid concern, it is the belief of this author that the environmentalist seeking to promote the use of alternative energy are the ones that have the stronger point; both morally and logically speaking. Due to the fact that renewable energy provides nearly resource neutral power production, it should be in the best interests of all involved to increase the means of production for this particular type of energy, on mountaintops or in fields in prairies etc. Henderson, John. "The Big Debate | Puget Sound Off." Puget Sound Off | empower, encourage SOUNDING OFF in your community. N.p., 25  Oct.  2012. Web. 11  Feb.  2013.

Thursday, September 26, 2019

End of Course Assignment Example | Topics and Well Written Essays - 2500 words

End of Course - Assignment Example Third is the aspect of the balanced scorecard that would help the company improve its operations. Last are the benefits and drawbacks of zero-based approach to budgeting for the business. This section contains the analysis of the Brown Bear Leisure’s financial statement, using relevant ratios, for the two-year period (2014 and 2015). The ratios are as follows: profitability ratios, liquidity ratios, and efficiency ratios. Net profit margin- this ratio shows how well a company manages its operating expenses such as the administrative costs and interests on borrowed funds. The higher the ratio, the lower the operating expenses of the enterprise. Concerning Brown Bear Leisure Company, the net profit margin for the year 2014 and 2015 have been determined as 7.07% and -0.53% respectively. The ratio interpretation for the fiscal year 2014 means that only 7.07% of the company’s revenue were net profit, whereas, remaining 92.93% were consumed by the operating expenses. However, in the year 2015, the ratio is negative reflecting the loss made by the company during that period. Net profit margin decreased between the two periods due to a sharp decline in the profit from positive to negative (Loss). Based on the analysis, the company’s operating expenses are excessively high, which indicates the ineffectiveness of the company’s cost management methods. Therefore, it is justified to mention that the company’s value creation ability is dwarfed by the high level of operating costs (Baker & Powell 2005, pp. 3-10). Gross profit margin- the ratio indicates a company’s financial health after meeting the cost of sales. It also shows the company’s ability to pay for future operating costs. Concerning Brown Bear Leisure Company, the gross profit margin for the year 2014 and 2015 have been determined as 41.24% and 34.46 % respectively. The ratio interpretation for the fiscal year 2014 means that 41.24% of the company’s revenue were gross

Wednesday, September 25, 2019

The Political Vision of Communist Manifesto Essay

The Political Vision of Communist Manifesto - Essay Example Marx does give credit to the contemporary Industrial Revolution to bring into existence a world market, aided and bolstered by the occupation of new colonies by the imperialistic forces. This Industrial Revolution has certainly led to progress and development in a scientific, commercial and communicative context. Yet, it goes without saying that the evolution and advancement of the Industrial Revolution supported and fed by the bourgeois elements is not merely materialistic and economic in its ramifications but does also have commensurate political ramifications. The bourgeoisie has not done away with the formal exploitative forces like feudalism and patriarchy to create an ideal world but has rather done so to remove all challenge and resistance to its advancement and growth. The bourgeoisie system and notion of economic growth simply cannot survive and expand without causing upheaval and disturbance in â€Å"the instruments of production â€Å"and â€Å"the relations of producti on†. Hence, as expected, the rise of the bourgeoisie has done away with all the hitherto existing notions of â€Å"national industries† thereby annihilating all the localized notions of belonging and allegiance. Yet, the irony of the matter is that the bourgeoisie concept of growth is not merely limited to profit accrual and limited domination. In contrast, the bourgeoisie intends to perpetuate its domination by remolding the existing socio-economic and politico-cultural structures as per one’s vision and interests. Hence to extend a material and political form to such vision and ideals, it is imperative for the bourgeoisie to compress and coagulate all sources and forms of production, leading to the unchallenged concentration of property in few hands. That way it gets easier for the bourgeoisie to retain a grip over the things and to perpetuate one’s advancement and dominion in the times to come. The existing feudal relations and frameworks of property ho lding were simply not in consonance with the bourgeoisie intentions. Hence, they were systematically dismantled and set aside. In their place, the bourgeoisie put in place a seemingly just provision of free competition, while doing its best to twist the political and social norms to be in alignment with the essence of free competition. Yet, what went wrong with this change is that while molding the world to its vision, the bourgeoisie also brought into existence its own nemesis that is â€Å"the modern working class†. The bourgeoisie commoditized labor as any other factor of production. It homogenized labor by resorting to the mechanization of all modes of production. Yet the â€Å"labor† class created by the bourgeoisie is bound to emerge victorious very early, helped and aided by the existing technology and infrastructure created by the bourgeoisie. In its rift with the aristocratic classes, the bourgeoisie tends to solicit the support of labor. This not only gives r ecognition to the working class but makes it a magnet for the other marginalized and sidelined sections of the society. As the working class emerges into an essential bourgeoisie platform, it starts seeing the institutions set by the bourgeoisie like morality, law, and religion as simply the tools of extending the vested bourgeoisie interests.

Tuesday, September 24, 2019

Why has the conflict between India and Pakistan been so intractable Essay

Why has the conflict between India and Pakistan been so intractable - Essay Example However since independence the relations between the two nations have been very sour with India and Pakistan having fought three battles against each other. The situation has reached an alarming intensity as both these nations are nuclear armed and another conflict between the nuclear armed nations can lead to a global catastrophe. The conflict between the two nations has continued since 1947 and has even starched longer than the cold war. There have been a number of contentious issues between the two nuclear powered nations however the conflict becomes intractable because of the fact that there is a territorial dispute between the nations. According to a research a conflict between two nations can be termed as intractable when specific tangible stakes involving land territory or other tangibly divisible aspects become symbolic in the sense that they are converted into intangible aspects in terms of zero sums that make it difficult to break and divide (Khan, 2009, p.61-62). The confl ict between India and Pakistan can be termed as intractable considering the fact that the bone of contentious issues lies in the disputed territory of Kashmir in which both the nations stake their claim. India refuses to Pakistan’s claim that Kashmir is their part as the area has a majority of population that follows the Muslim religion. India on the other hand being secular nation rubbishes the latter’s claim as it believes in the accession treaty signed by Maharaja Hari Singh, the last king of Kashmir in which he agreed to accede Kashmir into India (Ganguly, Diamond & Plattner, 2007, p.52). The following section would try to deeply analyse the aspects that have led to the conflict assuming such an intractable nature that still continues to capture global attention. Analysis In order to better understand the reasons behind the intractable nature of the conflict it is very necessary to look back to the history that led to the creation of these two states. The conflict between the two nations can be traced to the days of British colonialism in which both the nations were under the British rule commonly referred to as the ‘Raj Era’. In order to consolidate their rule in the nation, the English applied the ‘Divide and Rule’ policy taking advantage of the large number of diverse religious communities in the nation by turning one community against the other. In 1947 when the British decided to grant independence, it divided the unified India into 547 princely states. In addition to this the last viceroy of British India, Lord Mountbatten also encouraged the Muslim league leader Mohammed Ali Jinnah in keeping up his demand to either accept him as the ruler of independent India or carve out a separate state of Pakistan comprising the north western states of Punjab, Baluchistan and Sind. Mahatma Gandhi, the main architect of the independence movement in India had to accept the partition plan of India following which the unified India was divided into India and Pakistan (East and West). Post partition India chose to remain secular while Pakistan declared itself as an Islamic nation bound to ‘Sharia’ laws. The partition resulted in widespread riots claiming thousands of lives across both the borders and also left thousands homeless and orphaned. Meanwhile, the focus of the issue shifted to Kashmir that was a Muslim dominated area and on the basis of this Pakistan launched an armed assault on the state that was not a part of India or Pakistan and was under the rule of Maharaja Hari Singh, the ruler of Jammu province. Unable to stand the attacks by Pakistan, Maharaja Hari Sing

Monday, September 23, 2019

Code of Ethics Paper Essay Example | Topics and Well Written Essays - 1000 words - 1

Code of Ethics Paper - Essay Example (Donaldson, 2005) Section 54.1 Disclosure of Confidential Information Prohibited., Section 68: Retention of Clients records, Section 68.5 Audit Documentation Retention and Destruction Policy are the policies that when violated can lead to criminal or vivil accountant liabilities. The controversy involving powerful institutions has made an immense impact in the corporate world leading to their downfall and the implementation of stringent laws of the government. Enron and Arthur Andersen faced the collapse of their careers which affected the industry and the birth of the Sarbanes-Oxley Act. The largest bankruptcy in history marked the existence of fraudulent accounting procedures by Enron and Arthur Andersen in 2001. the once blue chip stock ended up to be valued for small meager amounts. Most of Enron’s profits were from transactions with controlled limited partnerships which turned into debts that were not reported on its financial statements The economic implications of the Enron case included the accounting industry’s review of their financial policies with the fear of having the same fate as Enron. Other companies who also used the same aggressive accounting methods as Enron have been affected. They steered away from the limelight and have seemed to have lay-low for the meantime while the issues are still steaming.. The existence of corporate fraud was verified by the emergence of the Enron case. With this, President George W Bush enacted a new law which targets the detection and prevention of company fraud. The US Pension regulations underwent scrutiny when it was found out that the worker of Enron lost a huge amount of money due to their pensions scheme being invested largely in Enron’s own stocks. The accounting profession tried to reconsider its structure and policies to be able to take notes of those that need to

Sunday, September 22, 2019

SHRD- HRD plan Essay Example | Topics and Well Written Essays - 2250 words

SHRD- HRD plan - Essay Example The issue that has been highlighted mainly is related to challenges that the employees are facing sue to an unsustainable organizational culture. The solution to this issue would be development of employee engagement plans. In this context, the strategic human resource development (SHRD) concepts have been utilized. Based on the strategic human resource development theories, training and development would be the most suitable way to solve human resource management issues. This would also help in complete employee engagement. Various training programs at different levels in the organization have been recommended and detailed implementation plan has been suggested for the senior management to understand the recommendations and its usage easily. Also the goal-oriented approach has been suggested for evaluating the after affects of the training programs. 1. Introduction 1.1 Strategic Human Resource Development The motive of Strategic human resource development (SHRD) is to incorporate an effective process through training and development. This would help in improving the ability of the employees to perform their task and increase the productivity of the company. SHRD is planned to assist companies in meeting the needs of their employees and also for promoting the goals of the company (Grieves, 2003, p. 8). 1.2 Human Resource Development Plan (HRD Plan) HRD Plans are strategic oriented plans, which indicates how the resources would be allocated, and ascertain the activities which needs to be funded, implemented, and encouraged, so that the employee development objectives are achieved. So the HRD plans include the design of the framework of the activities where assistance of the employees is essential to achieve the objectives or goals of the company (Werner, and DeSimon, 2011, p. 107-108). 1.3 Issues Leading to Employee Engagement After analyzing the organizational culture of RACQ, it has been identifies that certain challenges related to creation of appropriate org anizational culture persist in the company. A culture of creativity, innovation, skill, etc should be triggered within the employees of the organization by the management, through right employee engagement plans. Employee engagement includes engaging employees to their job through motivation, performance appraisal, training, etc (Albrecht, 2010, p. 3-6). 1.4 Outline of the Study The aim of this report is to provide recommendations with relation to employee engagement for human resource issues in RACQ. Each recommendation would be analyzed by providing an implementation plan. This would assist the senior managers to understand the motive behind such recommendation and the evaluation of the effects that the implementation would have. Since employee engagement is considered as one of the best solution to achieve organizational goals with the help of human resource, so all the recommendations would be based on employee engagement. 2. Recommendations Table 1 includes the basic recommenda tions under employee engagement, to completely engage the employees, so that they fit in the organization culture of RACQ. The implications behind choosing such recommendations for the learning interventions are also explained below. Table: 1 Recommendations based on Employee Engagement Recommendations Activities Audience Duration Activities Objectives Program for building service culture Achieving excellence through service -Developing the right mindset

Saturday, September 21, 2019

Types Of Cells Essay Example for Free

Types Of Cells Essay Select two structures of bacterial cells and briefly describe them; what do they look like, what are they composed of? Then, explain how these two structures allow bacterial cells to survive as unicellular organisms.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Two structures of bacterial cells are the cytoplasmic membrane and the flagella. The cytoplasmic membrane is mainly composed of two phospholipids layers or phospholipids bilayer (University of South Carolina, 2007).   It primarily acts as a selectively permeable barrier for a lot of molecules and also serves as a transport location of these molecules into the cell. In addition, the cytoplasmic membrane of bacteria also conserves energy as it also the location where motive forces are created for use (University of South Carolina, 2007). Basically, like any other cell membrane, a bacterial cytoplasmic membrane mostly contains lipids and proteins and other biological molecules that serve as the bacteria’s energy and life source (University of Wisconsin, 2008). Most bacterial cell membranes also contain hopanoids which function primarily to improve the fluidity of the plasma membrane by modulating its fatty acids. It can also play an important role in adjusting the permeability of the cell membrane and increasing the adaptability to extreme conditions (University of Wisconsin, 2008). Another important bacterial cell structure is the flagella. The flagella are filamentous structures which are attached to the surface of the cell that provide movement for most of the motile bacteria. They are mainly composed of protein and appear as whips or threads that extend from the body of the bacteria. In other words, they allow the bacteria to swim around while inside another organism. The cytoplasmic membrane and the flagella are two structures that are highly essential to the bacteria as it provides them to adapt and survive in most environments. The cytoplasmic membrane transports solutes such as nutrients and other molecules that enable the bacteria to live. It also serves as the location for the generation of energy or ATP which is important to any organism. The flagella, on the other hand, allow movement, which is important for a lot of bacteria, as it enables them to survive by moving around and infecting the host. Choose either a plant or an animal cell. Choose two structures or organelles of the cell (not used in part one above.) Describe these two structures or organelles – what do they look like, what are they composed of? Then explain how these plant or animal cell structures or organelles function. How do these functions support activities of the plant or animal cell and enable survival of the multicellular plant or animal organism?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Two important organelles of plant cells are the chloroplast and the endoplasmic reticulum. Chloroplasts is possibly one of the most vital organelles found in a plant as it conducts photosynthesis, which his the ability of plants to manufacture their own food using light (Molecular Expressions, 2005). It is the chloroplasts that absorb the light and use it together with carbon dioxide and water to produce sugars, which are the material that the plant uses for food. Morphologically, they appear as flat discs (Molecular Expressions, 2005).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The endoplasmic reticulum, on the other hand, appears as a network of tiny sacs such as cisternae, vesicles, and tubules. This network of structures mainly functions to manufacture, produce, transport, and process chemical compounds that will be used outside and inside the cell (Molecular Expressions, 2005). Basically, the chloroplast and the endoplasmic reticulum are very important organelles that ensure the plant’s survival. The chloroplast facilitate the manufacturing of the plant’s food source, which is important for any living organism, and the endoplasmic reticulum transports the energy sources as well as other chemical compounds that enable the plant to live.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   References Molecular Expressions. (2005). Plant Cell Structure. Cell Biology and Microscopy Structure and Function of Cells and Viruses. Retrieved August 3, 2008 from   http://micro.magnet.fsu.edu/cells/plantcell.html.    University of South Carolina. (2007). The Bacterial Cell. Microbiology and Immunology On-Line. Retrieved August 3, 2008 from http://pathmicro.med.sc.edu/fox/protype.htm. University of Wisconsin. (2008). Structure and Function of Bacterial Cells. The Microbial World. Retrieved August 3, 2008 from http://www.bact.wisc.edu/themicrobialworld/structure.html.

Friday, September 20, 2019

Suitable For Discharge Back Into The Environment Environmental Sciences Essay

Suitable For Discharge Back Into The Environment Environmental Sciences Essay The environment that we live in is our most valuable asset and we must not damage it by polluting the air, water ways and the earth. The concern about our environment has been taken into a serious matter in which all people and industries must play their part in keeping our environment clean and safe to live for a long time to come. The implementation of waste water treatment in private sector was a good effort from keeping the environment from being damage. In general, wastewater treatment is the process of taking wastewater and making it suitable for discharge back into the environment. Blower is one of mechanical devices that play very important role in waste water treatment. Its main function is to supply pressurized air with sufficient oxygen to meet process needs. Air is forced by blower to diffuser provide an aeration to encourage the growth of bacteria/microorganism in the water to break down the pollutants. Blowers come with variety of types; one of them is roots blower which most suitable uses for industrial waste water treatment. However, the disability of roots blower to function will bring major problem to waste water treatment section. The sewage cannot be treating because there is no air supply for aeration process. This disability may due to over-running, age factor and inner parts problem. More than that, whole manufacturing plant also will be affecting where the production line have to stop their operation because the treated discharge waste water unable to comply Standard B, Environmental Quality Act and Regulation. They also have to face loss such as the cost of downtime or shut down. This problem frequently happens in Synthomer Pasir Gudang Plant. More worse, every time the roots blower having problem, Engineering Department especially Mechanical Maintenance branch face difficulties to lift and move out the heavy blower from Blower Room. What burden them over the years is there are no proper ways to lift and move out dysfunction blower from Blower Room to send for servicing and maintenance activities. Since this project is based on my experience from previous Industrial Training, I was given an opportunity and encouragement from Engineering Department, Synthomer Pasir Gudang Plant to study the problem and design suitable blower lifter inside their Blower Room in order to helps them for maintenance works. Problem Statement The current technique used to lift and move out dysfunction blower is by hanging the chain block on the 6(six) inch stainless steel pipeline by using webbing sling. This technique is too dangerous and the possibility of the pipeline to crack and damage is very high because cannot withstand anymore the weight of the dysfunction blower after frequent usage. Besides that, improper technique of lifting heavy loads can cause hazard on workers also damage on equipments due to very low safety awareness. Other than that, the current technique just limited to lift blower itself only. Other equipments such as motor is beyond its capabilities. Fig. 1 below shows the 6(six) inch stainless steel pipeline used as a support to withstand the weight of dysfunction blower in order to lift and move out for maintenance works. H:DCIM102_PANAP1020888.JPGH:DCIM102_PANAP1020894.JPG Fig 1 The 6(six) inch stainless steel pipeline used as support to lift and move out blower These problems have motivate this project to design fully safe of new technique to lift and move out blowers as well as other equipments in order to help maintenance work involve in Blower Room, Waste Water Treatment Section, Synthomer Pasir Gudang Plant. Objective The aims of this project are: To design suitable blower lifter for maintenance activities at Blower Room, Waste Water Treatment, Synthomer Pasir Gudang Plant To propose fabrication of blower lifter Scope of Project The scope of this project will focus on design blower lifter based on problems involve in Blower Room, Waste Water Treatment Section, Synthomer Pasir Gudang Plant. The data and problems are taken directly from Synthomer Pasir Gudang Plant and any related data from others company that have Waste Water Treatment Plant will be neglected. However, if any Wastewater Treatment Plant that have exactly same configuration (Fig.2) as Blower Room in Synthomer Pasir Gudang Plant, the data involve in this project is acceptable to use. In addition, to achieve the project objectives, all information about the structure, configuration of equipments, and maintenance activities in Blower Room area is crucial in this project. C:UsersfasrayDesktoppart 7practikalpictureIMG_5216.JPGC:UsersfasrayDesktoppart 7practikalpictureIMG_5217.JPG Fig. 2 Configuration of equipments in Blower Room Blower Room, Synthomer Pasir Gudang Plant contains 5 units of blower (include motor, silencer, check valve, safety valve and pressure gauge), 10 units of butterfly valve, 2 units of room silencer, pipeline and fittings. Significant of Project The significant of this project can be dividing into two main groups; significant to Safety Maintenance work. 1) Safety The significant this project on safety is to: Reduce accident during maintenance work. Prevent equipments from damage. Provide proper way to lift heavy equipments. 2) Maintenance works Blower lifter help to improve and ease maintenance works involve in Blower Room area. This will ease the operators and technician works as this lifter will reduce the time of assembles and dissembles activities as well as reduce manpower/workers used while doing maintenance works. Besides that, the lifter could increase the worker productivity by the elimination of non-value adding material handling tasks from their work scope. Methodology Observation from industrial training Company needs Identify needs and problem define PDS Lit. Rev. Establish Target Specification Brainstorming Generate Product Concept Generate multiple concepts Concept Evaluation Pugh Chart Test against Specification CAD Detail Design FEM Simulation Testing Refinement Propose Fabrication Process Method Identify needs and problem define Ability to generate good engineering specification shows the person really understand the problems [1][2]. The initial stage of design process requires person to select specific client and identify need [3]. In this stage, there are two methods to identify the need: through observation from previous industrial training and need from employees, Synthomer Pasir Gudang Plant especially workers at Mechanical Maintenance branch, Engineering Department. Establish Target Specification Based on the workers needs and problem define from the observation, a list of target specification will establish [2]. The method to generate specification is using Product Design Specification (PDS) diagram and some literature review from existing product in market. Generate Product Concept [1] Ullman [2] epingger [3] paul m educate engineer [v] Filipp0 pds Task Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Project title selection Understanding the project title Determined the project objective Brainstorming Collecting data Literature review Report Writing Presentation Lagend: Planning Actual SFSFSF Task Week 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Conceptual Design Identify Need Problem Definition Establish Target Specification Generate Product Concept System-Level Design Select Product Concept(s) Test product Concept(s) Final Product Specification Plan Downstream Development Detail Design Details Drawing Bill of Materials Costing Testing Refinement Presentation Report Submission Lagend: Planning Actual F Methodology CHAPTER 2 Basic Wastewater treatment Process The goal of waste water treatment plant is to protect the environment in a manner commensurate with socio-economic and public health concerns. Wastewater is a combination of water and waste carried water come from homes, industrial and commercial facilities and institutions. Wastewater generally contains high levels of organic material, toxic, numerous pathogenic microorganisms and nutrients that extremely hazards to public health as well as lead to environmental pollution. So, wastewater must be treated appropriately before dispose to surroundings. Treatment of waste water usually carried out in four stages (Fig. 3), commonly referred as preliminary, primary, secondary and tertiary treatment [5]. Preliminary Primary Secondary Tertiaryhttp://www.membrane-solutions.com/img/product/water-treatment-process.jpg Fig. 3 Various treatment levels in a waste-water treatment plant flow diagram 1. Preliminary treatment Preliminary treatment prepares waste-water influent for further treatment by reducing or eliminating non-favourable waste-water characteristics that might otherwise impede operation or excessively increase maintenance of downstream processes and equipment. These characteristics include large solids and rags, abrasive grit, odours, and, in certain cases, unacceptable for organic loadings. Preliminary treatment processes consist of physical unit operations, namely screening and commination for the removal of debris and rags, grit removal for the elimination of coarse suspended matter, and flotation for the removal of oil and grease. Other preliminary treatment operations include flow equalization, septage handling, and odour control. 2. Primary treatment Primary treatment involves the partial removal of suspended solids and organic matter from the wastewater by means of physical operations such as screening and sedimentation. Pre-aeration with chemical additions is used to enhance primary treatment. Primary treatment acts as an earlier step for secondary treatment where the aimed of this stage is to produce a liquid effluent that suitable for downstream biological treatment and separate out the solids as a sludge that can be economically and conveniently treated before ultimate disposal. 3. Secondary treatment Secondary treatment is a stage where removal of soluble, colloidal organics and suspended solids happen after escaped the primary treatment. The process typically done through biological processes, commonly treated by using activated sludge, fixed-film reactors, or lagoon systems and sedimentation. 4. Tertiary or advanced waste-water treatment Tertiary treatment goes beyond the level of secondary treatment with 99 percent of impurities such as significant amounts of nitrogen, phosphorus, heavy metals, biodegradable organics, bacteria and viruses is removes from sewage where producing an effluent at almost drinking-water quality. In addition to biological nutrient removal processes, unit operations frequently used for this purpose include chemical coagulation, flocculation and sedimentation, followed by filtration and activated carbon. Less frequently used processes include ion exchange and reverse osmosis for specific ion removal or for dissolved solids reduction. [5] Metcalf and Eddy. Wastewater Engineering: Treatment, Disposal and Reuse. 3rd ed. New York: McGraw Hill, 1991. Process Flow Diagram The high organic load wastewater stream from the production plant is transferred to Equalization tank #1 (EQ-1) where organic and hydraulic Loading is equalized. Air is supply to the equalization tank for mixing and to prevent the wastewater from septic condition. When the accumulate wastewater reach to the set point level, the EQ pump will transfer the wastewater to Equalization tank #2 (EQ-2) and to mix with the other composite wastewater from the production plant. The organic and hydraulic loading is equalized again for further biological treatment. The composite wastewater from EQ-2 shall be transferred and pumped for Secondary Treatment, an aerobic treatment system namely Alternative Intermittent Cyclic Reactor (AICAR) via neutralization tank. pH of the wastewater is adjusted to ensure the aerobic digester operates at its optimum efficiency. All chemical dosing pumps are synchronized with the level switch. The pH is monitored and adjusted according to the set points by an automatic dosing pump system. Three (3) AICAR reactors are designed to handle the wastewater at an average flow from EQ-2. Each AICAR consist of two sub-reactors. AICAR operates in continuous mode on alternatively feeding and discharging wastewater from the reactor. One AICAR is allowed to stop for maintenance at one time while the others shall be at maximum operating efficiency. AICAR operates at 3 cycles per day per reactor in normal operation . During maintenance, only two AICAR reactors are set for running mode . When AICAR-1 is in feeding mode, first half of the reactor is in aeration while second half of the reactor is in settling and decanting mode. The circulation/sludge pump will be turned on to equalize solids content in aeration tank and at the same time, the sludge pump will operate as sludge wastage pump. At this stage, AICAR-2 3 are fully in aeration basis where the blower BL-02 and BL-03 are operating against the dissolved oxygen level in the reactor. The blower-diffuser system is provided to maintain the oxygen requirement in the aerobic treatment system. The air supply system is controlled by the online dissolved oxygen (DO) meter and the frequency of the blower motor is varied against DO content in water during normal aeration cycle. However, there will be a fix blower operation frequency during the feeding cycle to ensure sufficient oxygen provided for high organic load during feeding. The secondary treated wastewater is collected in the weir compartment of all AICAR and distributed into BioNET (Biological New Environmental Technology) reactor as tertiary treatment system. BioNET will act as a biological polishing system for refractory COD and at the same time will function as an ammonia nitrogen removal system BioNET reactor consists of two parallel lines (Figure 5). The reactors are filled with porous PU foam or non-woven fibres as reactors carriers that offer a large surface area for micro-organism adherence and growth. Wastewater will flow from the bottom of the BioNET reactor and in contact with the organism which attached to the BioNET carriers. BioNET will be backwashed to release excessive bio-growth to maintain the efficiency of the bacterial digestion. The SOP for the BioNET operation is shown in Table 1. All AICAR and BioNET operation will be prefixed with PLC system. After tertiary treatment, the treated wastewater will then flow into a Clarifier for solids separation. Patented Settling Tube is used in the modified clarifier to separate solid/biomass and supernatant or clear water is discharge to main drain as final discharge treated water. Electromagnetic flowmeter, pH The final discharge water. Flow and pH monitoring is to fulfil the regulatory requirement by the DOE. Wastage sludge from AICAR and settled sludge from Clarifier shall discharge to the drum thickener for thickening purposes before transferred to sludge holding tank. Wastage sludge from sludge holding tank is conditioned with polymer prior for dewatering.

Thursday, September 19, 2019

Womens Issues in The Awakening by Kate Chopin, The Yellow Wallpaper by

Women's Issues in The Awakening by Kate Chopin, The Yellow Wallpaper by Charlotte Perkins Gilman, and Souls Belated by Edith Wharton In comparing the three authors and the literary works of women authors Kate Chopin (1850 -1904), The Awakening, Charlotte Perkins Gilman's (1860-1935), The Yellow Wallpaper, and Edith Wharton's (1862-1937) Souls Belated, a good number common social issues related to women are brought to light and though subtly pointed out are an outcry against the conventions of the time. In these three stories, which were written between 1899 and 1913, the era was a time in which it seems, that women had finally awaken to realize their social oppression and were becoming rebellious in their pursuit of freedom from the male-dominated societal convention in which they existed. They commenced viewing their social stature as unjustly inferior and realized that these conventions placed deterrents on their intellectual and personal growth, and on their freedom to function as an independent person. All three of these women authors have by their literary works, have voiced their strong unfavorable fe elings about the patriarchal society in which they lived. These women authors have served as an eye-opener for the readers, both men and women alike, in the past, and hopefully still in the present. (There are still cultures in the world today, where women are treated as unfairly as women were treated in the prior centuries). These women authors have impacted a male dominated society into reflecting on of the unfairness imposed upon women. Through their writings, each of these women authors who existed during that masochistic Victorian era, risked criticism and retribution. Each author ignored convention a... ...ded her marriage as a full canceling of her claims upon life" (674). In all the stories, the authors commonly depict propriety in marriage, a yearning for freedom from convention, loveless marriages, wealth and unconventional women. Chopin and Gilman imply that the mental illnesses experienced by their characters are due mainly, to male oppression. Chopin and Wharton write about infidelity, passion and love; and Chopin and Gilman write about women working for pay. All authors write about women who feel trapped by tradition and convention and all display abhorrence toward the social expectations set for women. Bibliography: The Norton Anthology of American Literature. 5th Ed. W.W. Norton & Co. NY. 1998. Chopin, Kate. The Awakening 672-690. Charlotte Gilman Perkins. The Yellow Wallpaper 657-670. Wharton, Edith. Souls Belated 467-670

Wednesday, September 18, 2019

What Is Politics? :: Essays on Politics

What Is Politics On hearing the word politics, what usually springs to mind are images of government, politicians and their policies or more negatively the idea of corruption and dirty tricks. The actual definition seems to have been obscured and almost lost by such representations and clichà ©s that tend not to pinpoint the true essence, which defines this thing, called politics. In order to make an attempt at a definition of politics a systematic approach is required. To begin with, a brief historical overview will be considered, to understand the origins of politics. Following this, different core concepts, which are imperative to a definition of politics, will be discussed, in the hope to discover a true and fair interpretation of the word politics. The word politics comes from the Greek word "polis", meaning the state or community as a whole. The concept of the "polis" was an ideal state and came from the writings of great political thinkers such as Plato and Aristotle. In his novel "The Republic", Plato describes the ideal state and the means to achieve it. Hence, the word politics originally has connotations in the ways in which to create the ideal society. An ideal society is in practice a rather difficult aim and even an impossible aim to achieve. Politics implies measures which could and should, in the views of their devisor, be implemented in the hope to create a better society, than that which is already present. The very fact that Plato and Aristotle saw imperfections in the societies in which they lived, prompted them to write their political philosophies. These philosophies provided the first written recognition of politics. In his writings his "The Politics", Aristotle states that "Man is by nature a political animal"(The Politics, 1) in another words, it lies deep within the instinct of man. It is almost primal. Due to his nature man should consider and realise his role within the "polis". So according to Aristotle Politics is not a dreamt up concept, but rather an inherent feature of mankind. To begin with, the basest premise that underpins the notion of politics should be considered in order to arrive at a fair definition. Man is self-preserving by nature. He thinks and acts, whether that is as an individual or as a group who share interests, with foremost regard to his own interests. Self-perpetuation is the number one rule. He therefore possesses his own interests, ideas and preferences, which may

Tuesday, September 17, 2019

Career path

The skills that I think are necessary for success in college are being self-motivated, having effective time management and a strong dedication and willpower to want to succeed. The desire to succeed can only come from you. There are people to help you along the way, but you are the only person that can make a change for yourself and for the better. Self-motivation is the number one factor in having a successful college experience. Once you have made a decision to further your education you must realize that there will conflicts throughout.Conflicts with work or family may arise. If you lack self-motivation, there is a possibility you will lose sight of what your goal is. There must be a balance between school and other obligations. You are responsible for finding that balance to ensure a successful college experience and a happy personal or work life as well. Effective time management is imperative in college. There are many times when tests and papers are due at the same time for e ach class. It is important to know what lies ahead in each class.A monthly calendar allows you to note upcoming due dates, midterm and final dates. It is helpful to have a visual so you can plan on a teeth to allow yourself adequate time for each class. Some people may be good at procrastination but when taking multiple classes, I don't think waiting until the last minute is effective. You made a decision to invest time and money to enter college. You have a goal in mind. In order to reach that goal you need a strong dedication and willpower to succeed. There will be bumps along the way.Each class will introduce new ideas and responsibilities; when those responsibilities conflict with other responsibilities, I think you need the willpower to push through it. You need the dedication to the lasses and program you enrolled in. Keep the end goal in sight. The skills that I already have are being self-motivated, having effective time management and a strong dedication to being successful in college. I am a lifetime learner. I enjoy attending my classes and what is involved to succeed. Part of what helps me succeed in my classes is being effective with time management.I have learned how to handle a full time class load, working and having a happy family. My last Job required you to be great at multi-tasking. Multi-tasking is useful when attending college and having a young family. I have learned how to study while my hillier are occupied or napping. I also have my husband's support which is crucial when attending school. In order to write a paper or study for an exam I will either go to the library, my parents' house or at times my husband will take our children somewhere, Just to give me the time I need.I don't think you could succeed in college and in personal life if you don't have the dedication to school. I want to succeed and do well in college to better the life for my family. I am dedicated in accomplishing my goal and I know I will succeed. I have developed these skills through experience. I graduated from high school in 999 and have been attending college since, taking breaks to start my family. I have an associate degree already but have always wanted to pursue nursing. Since graduating with my associates degree, I have always taken part time classes, while working full time and having a family.However, I made the decision to enroll full time and complete my degree. I have three young daughters, all less than six years old. I know that to better their lives I must finish schooling. I want them to see that a higher education is something to strive and work toward. I want them to see my self-motivation and my dedication, to only to them but to school. Effective time management is a necessity when raising my children, being a spouse and being a successful student. I have learned to love my calendar. I write everything down.I have to see lies ahead for my family and for school. One weakness that I have is being committed to too many dif ferent things with my children, all while I am trying to finish school. I sign up to help with a lot of their events and organizations. I need to realize that I am only one person and cannot do it all. I need to only sign up for a select number of events and commit myself to those instead off little bit here and there. I also have bad test anxiety. I am hoping that I can alleviate the anxiety I get by allowing myself adequate time to study and prepare for tests.I also need to have confidence in myself to know that I will succeed on the test. I try to go into each test with a positive attitude. I will be taking the TEAS test on 11/16/12. I have heard so much negativity towards the test from peers that I try to distance myself from the negativity. I know that going into the test Friday that I have done all I was able to do and look forward to seeing my results. I have chosen a nursing career. The same skills listed for a college experience are also needed for a successful nursing care er.In addition to these, strong interpersonal skills and critical thinking skills are needed. I have worked in the health care field for over 10 years, so I have seen first hand what skills are needed and already have knowledge of medical terminology and Anatomy and Physiology. This is only my first semester at Bryant & Stratton. I still need to pass my TEAS and am looking forward to being accepted in the nursing program. I would like to improve upon my confidence. As a nurse you don't have time to second guess yourself. I need to realize that I know the answer and stick to it.I also need to stop being afraid of failure. I need to set little goals and as those are accomplished, celebrate them. This will make my long term goal seem not so far out of reach. I previously stated that I like to avoid negativity. I do not want to be surrounded by negative people or situations. This only brings my confidence down. I also want to remain an active learner. Whether this means taking continuin g education courses or reading a health Journal related to my field; I know that this will increase my confidence because I will be full of knowledge.In conclusion, it is important to understand that the decision to enter college is a life changing decision. Dedication, time management, and the desire to succeed and take responsibility for what needs to be are commitments that must be made upon making the decision to enroll in college. The approach I took when writing this paper is following the outline given and responding to each question. The outline style was effective for this paper since a list of skills were required. I did not forget to expand on any skill since I had it in the outline format.

Monday, September 16, 2019

Organization or institution Essay

A policy can be defined as a guide to the actions or decisions of people in organization or institution. A policy states how members of an organization should act in specific situations which occur frequently and affect large numbers of people in a group. A policy has three components namely: it must have a process to achieve certain goals, it must have specific goals to realize and it must have a framework within which it functions. According to Dimock a scholar, policies are important in guiding the conduct of people who make decisions and take actions in organizations. However, the term policy is often confused with other related terms such as a rule, a plan, a decision and a procedure but in reality there is a marked difference between a policy and these other terms. According to the scholar known as James Anderson in his book titled â€Å"public policy analysis†, public policy is about why government do things they choose to do and the difference that it makes. Government does many things such as conflict resolution in society, organizing society to carry out conflicts with other societies. Governments also distribute a great variety of goods and services to the members of the society mainly in the form of taxes. Thus, public policies may regulate behavior, organize bureaucracies, distribute goods, collect revenue any other desirable activity. For this reason public policy is designed to alleviate personal discomfort or societal unease. This is due to the fact that people expect government to do many things for them and indeed there are no personal or societal problems for which some group will not demand a government solution. Public policy studies therefore deals with the description and explanations of causes and consequences of government activity. It therefore connotes a positive side of an action in the sense that it emphasizes an initiative by government to solve problems faced by people. The government has many sources of revenue which include: Taxes-The government can get its revenue from various sources of taxes in a country. Tax is a compulsory contribution by the government on its citizens to enable it to meet its expenses for a common cause. Tax enables the government to provide social and merit goods and services. These are the so called public goods and are consumed by all citizens irrespective of whether they pay tax or not e. g. provision of roads, bridges, social facilities etc. Also taxation is used as a controlling the flow of cash and capital in a country to ensure economic stability. It is used as a tool of economic policy e. g. imposition of high import duty in order to protect local industries granting of capital allowances and other tax incentives to encourage the inflow of direct foreign investment. Internal borrowing is another method whereby the public policy can get its funding. This is done through the sale of treasury bills and bonds. It might be restricted to a given percentage of gross domestic products. Although used, it has some effects like it pushes up the interest rates in the economy hence increasing the cost of capital and it may exercise inflationary pressure on the economy once the government repays the money. Aids and grants. This may be given by international monetary fund and World Bank and other bilateral donors. But it has constraints like strict terms and conditions which are imposed by donors which may be humiliating to the nation, it may not be sufficient to solve the budget deficit problems of the government. External borrowing usually from other countries or organizations such as IMF and World Bank. It has effects like humiliating terms and conditions and also the country will increase its already heavily burden of external debt. A BUDGET AS APUBLIC POLICY A budget is generally a list of all planned expenses and revenues. It is a plan for saving and spending. A budget is an important concept in microeconomics, which uses a budget line to illustrate the trade-offs between two or more goods. The budget should contain a narrative explaining how you decided on the amount of this reserve and a description of the expected financial results of business activities. The assets should be valued with each and every cost. All other expenses are like labor factory overhead all freshmen expenses are also included into business budgeting. A budget is considered as a proposal to be prepared by the administration and submitted to the legislature. Its aim could be to present in summary form the facts necessary to shape the policy of the government as well as provide financial support. The summaries of fact included in the budget could also serve as a key to the details of transactions and of estimates which could be submitted with the budget. The constitution inhibition that no money shall be drawn from the treasury but in consequence of appropriations made by the law makes the budget an instrument of legislative control over the administration. To implement policies, government requires money as well as institutional structure. The budgetary process provides a means of allocating the available resources among competing interests to which they could be applied. When they device a budget, decision makers function within a definite resource constraint and must base their decisions on the assumption that no more revenue will come in. Therefore they allot the available amount of money for the greatest social, economic and political benefit. Each year there must be a new budget and an annual circle has evolved for the appropriation and expenditure of available public moneys. The repetitive nature of the budget cycle is important, for those involved might behave differently if they did not know that they have to come back each year after year to get more money. For instance, the government of United States budget system provides the means for the president and congress to decide on how much money to use, what to use it on, and ways of raising the money they have decided to use. It is through the budget system, whereby they determine how the allocation of resources between the agencies of the federal government. In most cases there are consequences in the decisions made during budget process due to the fact that they affect the state as a whole, nation and local governments, and individuals in the country. Budget decisions in most cases have significance in most of the countries in the whole universe. After the congress and the president have enacted budget decisions into law, the budget system on the other hand ensures that these laws are carried out. The process of planning future business actions and expressing those plans in a formal manner is what is referred as budgeting. A budget is a formal statement of future plans since the economic or financial aspects of the government are primary matters of consideration. Every branch of the government is necessarily high complex and technical . A budget therefore supply the need for an effective means whereby those who are responsible for direction and control over technical process and who understands the technical needs of the service may formally present to the legislature and through the legislature to the people a well defined plan of work to be financed in order that the government may make a provisional for needs of the country. The ways in which budgets are made reflect the choices, policies and philosophies of governments. Public finance covers budgeting as well as taxes and revenue. The budget is made up of revenue and expenditure proposal which have great chances of impacting as a public policy tool. Taxation deals with policy issues including: regulating the activities of firms in certain sectors, affecting production in that it can be used to encourage or discourage production, stabilization of the economy through control of inflation and even the distribution of wealth e. g. exempting low income earners from paying tax. The budget allocations are made to government departments and ministries like agriculture, education, public health, trade, foreign affairs, defense, transport, etc and are formally made by relevant ministries. The exact character of engrossed revenues varies from case to case. Bureaucratic politics is naturally concerned not only with the direct allocation of budget items but also with a struggle to engross revenues and create monopolies or cartels. Well established government involvement in agriculture includes state corporations like on sugar. Government agencies may be assigned monopolistic rights for the exploitation of mineral resources, to produce and sell sugar or to sell seeds and fertilizers. Similarly, a public health may be established e. g. a dispensary to offer Medicare facilities at a subsidized rate and in return the government generates revenue. The result is that public enterprise actually pays its own way and even produces a profit which goes into the state budget. The national budget as a policy tool also focuses on education. Public education may be defined as schooling mandated for or offered to all children by the government whether national, regional or local provided by an institution of civil government and paid for in whole or in part by taxes. Public education is applied to basic education, primary and secondary schools. Moreover, post secondary education like middle-level colleges and advanced education e. g. universities-all these constitute public education since the government subsidizes or pays in full to sponsor students. Ideally, the budget is designed to meet most of the foreseen programs and projects. In spite of the significance of the budget in education, agriculture, revenue generation, spending etc, it is equally necessary to state that the government experiences various risks including; property loss, loss of income or increased costs, damage to real and personal property, liability etc. Different strategies are used to manage risks including: risk elimination, risk reduction, risk assumption, risk transfer and risk insurance. However, problems in budgetary process seem to be widespread. The list may not be exhaustive but these include: Uncontrollable expenditure; the most important uncontrollable expenditures are the large entitlement programs of social welfare spending such as social security, Medicare and unemployment benefits, back door spending; expenditure decisions that are not actually made through the formal appropriation process, reprogramming and transfers; i. e. the shifting of funds within a specific appropriation account. Reprogramming involves shifting obligation authority from one program element to another and supplemental appropriations; i. e. made outside the normal budget circle to cover shortfalls during the fiscal year. Supplemental appropriations occur during recession, the demand for unemployment assistance naturally increases and supplemental funding will be required. The budget is made up of revenue and expenditure proposal and hence such proposals have a greater chance on impacting on public policy. A budget as a policy tool acts as a source of motivation because budgets provides the standards against which actual performance is evaluated and the manner in which it is used can significantly affect the attitude of those who are to be evaluated. If the government is not careful a budgeting process may have negative impacts on the attitudes of the civil servants. A budget is considered as a proposal to be prepared by the administration and submitted to the legislature. A national budget thus prepared and presented would serve the purpose of a prospectus. The act of appropriation as the legal means of making funds available to the executive branch enables the executive or some officer directly responsible to the executive, to exercise administrative control over liabilities incurred and over expenditures made by the many officers and agents employed by the government in the conduct of its business. Every branch of the business of the government is necessarily highly complex and technical. An act of appropriation of public money should therefore be the result of the most careful consideration of both branches of the government. For the purpose of consideration on the relation of revenue and borrowing to welfare, a budget is necessary. The budget as a policy tool is used as a basis for evaluating performance among various government ministries. The control functions of the government require that departments /ministries draft an evaluation report on their performance. A budget greatly determines their performance as it allocates various amount of funds to each. Although past performance among various ministries is potentially superior for determining whether the actual results are acceptable or in need of collective actions. Budgeting promotes study, research and focus of the future: when the government plans with sufficient care and details to prepare a budget, the planning process involves thorough study and research. Not only should this results in the best conceivable plans but it should also instill in executive the habit of doing a reasonable amount of research before decisions are made. Allocation of taxpayer’s money by the budget is massive hence before deciding on what project the government should undertake some funds are set aside by the budget to carry out thorough research to come up with realistic and attainable goals. The budget can mostly be viewed from the economic consideration. The budget serves as a fiscal policy in terms of expenditure and revenue to stabilize the economy. Governments spend money on a wide variety of things from the military and services like education and healthcare as well as transfer payments such as welfare benefits. These expenditures can be funded through: taxation, borrowing money from the population, benefit from printing money, sale of fixed assets, consumption of fiscal reserves etc. Governments borrow money and may sometimes incur debts. Several circumstances may force governments into a debtor position including, the need to cover deficits resulting from annual expenditures, the need to finance a long-term project and a short-term cash management to provide disbursement of payments in a timely fashion. No document can rightly be called a budget that does not set up a complete plan of the proposed expenditures for a definite period and balance those expenditures with the estimated means of financing this show a complete picture of the government’s finances. The budget should be setup and summarized as to make this picture quite clear to the citizens and taxpayers. A budget should be adopted before the beginning of the fiscal period to which it relates so that necessary accounts can be setup. Effective control over the execution of the budget plan; the proper executive authority and supervision should be provided to put the plan into operation. Physical control should be established through accounts and otherwise ensure that the expenditure of the government are being made to the budget plan. Staff assistance must be considered depending upon the size of the government that can give attention exclusively to the collection of the budget information. There is need for government to have broad and accurate information which must be reliable and indicate clearly the scope of the work and the various activities of the government. For the purpose of considering the relations of revenue and borrowing to welfare, the budget should present for consideration of the legislature a definite financial program. The level of government borrowing is an important part of fiscal policy and management of aggregate demand in any economy. When the government is running a budget deficit, it means that in a given year, total government expenditure exceeds total tax revenue. As a result, the government has to borrow through the issue of debt such as Treasury Bills and long-term government Bonds. The issue of debt is done by the central bank and involves selling debt to the bond and bill markets. Each general fund spending agency’s financial overview presents and outlines revenues and expenditures for the current budget. The scheme describes the spending agency’s mission statement services provided, staffing summary, objectives, goals, current year budget highlights and performance measurement information. Each of the other funds classified as special revenue funds, enterprise funds, capital project funds, and internal service funds are detailed in the same format as the general fund. Describe restrictions that are (or could be) placed on those revenues. The government can give restrictions on its revenue in order to achieve its goals or objectives. For example the taxation of citizens must be compulsory so as to raise public revenue in order to meet public expenditure relating to maintenance of internal security and external defense of a country and also provision of basic social services at a subsidized cost e. g. education, water, recreational activities, health facilities etc. In most cases, accrual basis of accounting is used to in full so as to record expenses as paid not when they take place, diminishing the value of the government‘s capital assets. This is not accounted for as cash expenses, in the long-term, their value as an asset or liability is recognized. It can be recorded through measurement focus as a separate account, realized as revenue in one department, or revealed as an expense in another. For instance, the general funds and purchasing department would work in series in this kind of arrangement so as to manage the amount used up for procurement and adjust budgets for extra expenses, such as purchase of extended warranties and service plans. The restrictions placed from congress, grantors and private groups often ‘restrict’ these funds for specialized uses. The government may restrict that revenue coming from taxation for example will be used to run free education for university students or be used to carry out research. The general fund holds money in reserve to pay for utility expenses, or earmarks it with the donor’s wishes for example where the donor wants a certain project to be established by the lending. Capital assets are recorded as expense when they occur, not as cash income which is not the case with businesses. The nature of organizations divides funds into categories of resource restriction not functional operations. Evaluate how public policy decisions affect the receipt of revenues. For example where the government imposes high rate of tax for its employees or businessmen may make employees to start practicing tax evasion. This is due to the high amounts they will be required to pay as tax and it will minimize their profits which is their objective as they where venturing into business. Decisions suggested in the previous enacted budgets, and how programs are actually performing influence decisions concerning the future budget of a country. The decision-makers in a country must consider the effects of economic and technical assumptions on the budget estimates so as to avoid over/underestimation. , the rate of inflation, interest rates, the unemployment rate, economic growth and the number of people eligible for various benefit programs, among other things, affect government spending and receipts. For example the government can start some programs in the country so as to help the unemployed to at least to be busy somewhere making something small to sustain them hence affecting the government receipts and spending as it was not budgeted for. Small changes in these assumptions can affect budget estimates by a large amount of money. Through the process of adopting a budget resolution, it concurs on levels for total spending and receipts, the size of the deficit or surplus, and the debt limit. Stages of implementation of the decisions can use feedback to make changes when high cost programs to collect taxes are reactive to public reaction, overruns in cost, long term worth of the policy, manpower and material, employee activity ,time, and the use of consultants, and third party vendors with substantial interest and involvement in policy objectives. Usually implementation is the actual application of a policy and it involves activities such as disbursement of funds, the general mobilization of resources in order to actualize programs and projects. The debt issues as other sources, discounts as other income, while the debt service expenditures express issuance costs. Analyze the economic conditions that affect revenue projections Inflation and the rising cost of employee benefits. For example hyperinflation which is the most serious type of inflation also known as runaway or galloping inflation . it has been experienced in Germany, Austria, Hungary, China and other countries of South America. When this type is experienced, the currency in circulation becomes unacceptable and in the end new currency is issued. Inflation may be due to increase in demand of goods and services may result in arise in price level. Also when cost of production increases the prices goes up it may rise due to the higher wage levels, higher cost of raw material or more taxes on the production of commodities. These may affect the revenue projections by the government in place as it may under forecast or overcast the revenue projections. In some cases citizens may not comply with the rules and regulations of a country in that they could like to practice tax evasion. This is a criminal offence involving evasion of tax through fraudulent means e. g. the manipulation of financial statements and failure to make full disclosure of taxable income, or engagement in illegal activities e. g. parching, drug trafficking etc where income is generated without paying tax. This affects the revenue projections by the government because at the long run it will end up underestimating the revenue to be expected. Capital expenditures for replacement of equipment and emergence expenditures like floods which require an immediate attention. This usually affects the revenue projections because it was not budgeted for or projected for. This will end up diverting some amount meant for another purpose to be used in that emergence in order to save the situation. Or in other cases where a machine used in the intensive care unit is not functioning, it will require an immediate attention so as to purchase a new one in order to save the lives of the patients. Diverting from designed performance measures is crucial because annual cash flow statements and budgetary budget flows are necessary to maintain the business focused on annual expenses and changes to the same. Realistic interpretations of the best use of income generated through taxes, fees, surcharges and capital funds ties it into most effective and accessible to public use of the money that will benefit all the most. Develop a revenue policy that aligns with community values. A public policy must take into consideration the prevailing customs, traditions and conventions of people. Thus, the policy must not go against established ways of life of the people unless it is extremely desirable to frame one that bans a social evil. Also it must take into account the availability of resources especially financial resources that are critical for its implementation. Such resources may be derived either from national budget or other sources such as donors or loans from commercial banks. Most employees would like to contribute without any difficulty to the revenue of the country if their community interests are going to be catered for. The residents would like to have available facilities like a hospital near home or work, and that of suburbs wishing to enhance tax base, and enjoy the benefits of their contributions. Strategic plans and major projects often have the same type of written statement of record. Citizens in general, advocate for a return on investment. Public administrators and urban planners share the idea that government should support reinvestment in communities in order for them to prosper. For example if the country comes up with a policy to have a certain community to contribute more to the kitty of revenue so as to build an hospital . The community will contribute positively because it will help them in many ways like travelling a short distance to get the services and also employment. This will save many lives were it that they were emergencies and people were to travel long distances to get the services. If there is a plan to initiate a project like an industry in a certain community, the residents will be willing to contribute to that project as they will be assured of the benefits from it. Fines and penalties are also compulsory unreciprocated payments, but are distinct from taxes as they should be punitive in nature and imposed by a judicial body. This may be imposed on people who go against the morals or the norms of the community. Social Contributions are payments either from employees or employers in exchange for Social benefits in the future, or to insure against risk in the future. Voluntary Social Contributions are excluded from measures of the tax burden e. g. Payments to pension schemes. Conclusion In general, public policy undergoes several stages from problem identification, agenda seytting, policy formulation, policy legitimation, policy implementation and monitoring and evaluation. In the study of public policy there are theories and approaches to its study. They include rationalist/comprehensive approach which emphasizes the idea of maximum social gain from the policy. For a policy to be adopted its benefits must exceed its benefits. If the forecaster overestimates revenues in any one country, the consequences are serious: plans must be cut so as to meet the revenue which is received, implying that services will be reduced, or citizens will be taxed more in which case political and administrative costs are acquired. if the forecaster underestimates revenue, however, no such consequences must be confronted because the programs will be run within the budget limit. The costs which may be incurred from underestimating revenues are significantly less than the costs which may be incurred from overestimating revenues. Implementing policy may end up with results which were unexpected; it may come from a policy whose reach goes beyond the problem it was initially meant to address. REFERENCES Dirk Jan Kraan. Budgetary Decisions, A Public Choice Approach (1996), Dye Thomas, Understanding Public Policy, (1984) Henry Nicholas, Public Administration and Public Affairs, (1995) James E. Anderson, Public Policymaking: An Introduction. (2006). McLennan B. Comparative Public Policy (1980) Praeger, Public Sector Management, (1990) Sabatier, P. , and Mazmanian, D. Implementation and Public Policy (1989)

Sunday, September 15, 2019

Cultural knowledge

Cultural knowledge is of great importance for contemporary society, because in the global world it is necessary to set friendly relations and working contacts with all the cultures and countries. A potential classmate for me is Chinese student, because Chinese culture is significantly different from others and I would be able to learn new things, ideas, core beliefs from Chinese student.I know that Chinese culture is one of the oldest in the world and, therefore, it is really worth examining and studying. It would be interesting to know more about Chinese family values and belief, communication peculiarities, about economic and political objectives of the country as well as about their leisure time.Thus, Chinese student would certainly help me in expanding my cultural knowledge. Chinese people are outwardly restrained, because they are influenced by Confucius' philosophical thinking and thus they are more reserved in verbal and nonverbal communication.Emotional gestures and body lang uage is less expressive as compared with Cuba or Brasilia, for example. As for me, I am very communicative person and it is interesting for me get acquainted with completely different behavior.I know that there are peculiar values in Chinese culture and I think we should pay special attention and, maybe, even to adopt them. For example, family is considered the basis of Chinese culture, especially extended families, when several generations are living together in one house.The elder generation is respected for their wisdom and usually they are provided with good pensions compared with that in other countries. It is important to know that Chinese family members tend to work as a team living under one roof as it is mentioned above.The family welfare is contributed by every family member, either young or elder. I understand that we should follow Chinese in certain traditions, customs. Â  So, I would be provided with an opportunity to adopt some Chinese values as well as to share my cu lture and my knowledge with Chinese student. Furthermore, they are considered non-conflict people.ReferencesCountry’s Profile: China. Retrieved January 17, 2007, from http://www.cp-pc.ca/english/china/index.html

Creative industries Essay

The creative industries are those that take traditional creative talents in design, performance, production and writing, and merge these with media production and distribution techniques and new interactive technologies (for customization) in order to create and share out creative content all through the service sector of the new economy. The form of production is ‘Hollywood’ not ‘Detroit’ – project-based and innovative, relatively than industrial and standardized. It is distinguished by networks and partnerships. Consumers have given means to users – interactive partners in further development of the creative product. The creative industries give content products for the new knowledge economy. It is here that the main social and consumer impact of new interactive media technologies is felt, as people are much more involved in content than in technologies as such. The appeal lies in the story, view, song or speech, not in the carrier mechanism. This is increasingly true where the prospective for distribution of creative content via the Internet and other new interactive communication forms is being realized. Additionally, audiences increasingly anticipate high-tech content, interactivity and customization in traditional arts, media and entertainment industries. In this context, creative content is not restricted to leisure and entertainment products, but expands to commercial enterprises generally. As the new interactive media technologies develop from b2b to b2c applications, creative content will be the fundamental requirement, whether the application is for a bank, an educational institution or an entertainment provider, or whether the user is in ‘ sit up ‘ or ‘ sit back ‘ mode. Previously distinctive industries have rapidly incorporated. Advances in technology and increases in system performance have formed a fertile environment for the incubation and growth of new sectors and the prospect for existing disciplines to find new commercial applications. For example, animation and creative writing both found new application in the growth of computer games, which themselves have developed from one-person to interactive games, with several players, via the Internet. The inspiration of the ‘intangible’ sector relies more than ever on creativity, style and risk-taking imagination – on creative enterprises feeding continuously updated new content into technologically advanced knowledge-based industries. But content providers no longer require being located in metropolitan centers or one of the many ‘silicon valleys’ in order to play a global role. â€Å"The creative industries are the key new growth sector of the economy, both nationally and globally, and thus, against a background of manufacturing sector decline, they are the key source of future employment growth and export earnings† . Music, animatronics, design, publishing, interactive media, e-commerce and entertainment are all cottage industries on the creative or supply side, relying on small/medium enterprises (SMEs) and freelance creative talent working through short-lived projects. The requirement in this context is for interdisciplinary clusters, flexible and extremely porous teams, and creative enterprises to a certain extent than large-scale vertically integrated industries. The creative industries are a considerable sector of the global economy.

Saturday, September 14, 2019

My Father

Electronic mail, also known as  email  or  e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the  Internet  or other  computer networks. Some early email systems required that the author and the recipient both be  online  at the same time, in common with  instant messaging. Today's email systems are based on a  store-and-forward  model. Emailservers  accept, forward, deliver and store messages.Neither the users nor their computers are required to be online simultaneously; they need connect only briefly, typically to an  email server, for as long as it takes to send or receive messages. Historically, the term  electronic mail  was used generically for any electronic document transmission. For example, several writers in the early 1970s used the term to describe  fax  document transmission. [2][3]  As a result, it is difficult to find the first citation for the use of the term wi th the more specific meaning it has today.An Internet email message[NB 1]  consists of three components, the message  envelope, the message  header, and the message  body. The message header contains control information, including, minimally, an originator's  email address  and one or more recipient addresses. Usually descriptive information is also added, such as a subject header field and a message submission date/time stamp. Originally a text-only (7-bit ASCII and others) communications medium, email was extended to carry multi-media content attachments, a process standardized in  RFC  2045 through 2049.Collectively, these RFCs have come to be called  Multipurpose Internet Mail Extensions(MIME). Electronic mail predates the inception of the  Internet, and was in fact a crucial tool in creating it,[4]  but the history of modern, global Internet email services reaches back to the early  ARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Conversion from ARPANET to the Internet in the early 1980s produced the core of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.Network-based email was initially exchanged on the ARPANET in extensions to the  File Transfer Protocol  (FTP), but is now carried by theSimple Mail Transfer Protocol  (SMTP), first published as  Internet standard  10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates delivery parameters using a message  envelope  separate from the message (header and body) itself. The diagram to the right shows a typical sequence of events[48]  that takes place when  Alice  composes a message using her  mail user agent  (MUA).She enters the  email address  of her correspondent, and hits the â€Å"send† button. 1. Her MUA formats the message in email format and uses the Submission Protocol (a profi le of the  Simple Mail Transfer Protocol  (SMTP), see  RFC 6409) to send the message to the local  mail submission agent  (MSA), in this casesmtp. a. org, run by Alice's  internet service provider  (ISP). 2. The MSA looks at the destination address provided in the SMTP protocol (not from the message header), in this [email  protected] org. An Internet email address is a string of the [email  protected]The part before the @ sign is the  local part  of the address, often the  username  of the recipient, and the part after the @ sign is a  domain name  or afully qualified domain name. The MSA resolves a domain name to determine the fully qualified domain name of the  mail exchange server  in the  Domain Name System  (DNS). 3. The  DNS server  for the  b. org  domain,  ns. b. org, responds with any  MX records  listing the mail exchange servers for that domain, in this case  mx. b. org, a  message transfer agent  (MTA) server run by Bob's ISP. 4. smtp. a. org  sends the message to  mx. b. org  using SMTP.This server may need to forward the message to other MTAs before the message reaches the final  message delivery agent  (MDA). 1. The MDA delivers it to the  mailbox  of the user  bob. 2. Bob presses the â€Å"get mail† button in his MUA, which picks up the message using either the  Post Office Protocol  (POP3) or theInternet Message Access Protocol  (IMAP4). That sequence of events applies to the majority of email users. However, there are many alternative possibilities and complications to the email system: * Alice or Bob may use a client connected to a corporate email system, such as  IBM  Lotus Notes  or  Microsoft  Exchange.These systems often have their own internal email format and their clients typically communicate with the email server using a vendor-specific, proprietary protocol. The server sends or receives email via the Internet through the product's Inte rnet mail gateway which also does any necessary reformatting. If Alice and Bob work for the same company, the entire transaction may happen completely within a single corporate email system. * Alice may not have a MUA on her computer but instead may connect to a  webmail  service. Alice's computer may run its own MTA, so avoiding the transfer at step 1. * Bob may pick up his email in many ways, for example logging into  mx. b. org  and reading it directly, or by using a webmail service. * Domains usually have several mail exchange servers so that they can continue to accept mail when the main mail exchange server is not available. * Email messages are not secure if  email encryption  is not used correctly. Many MTAs used to accept messages for any recipient on the Internet and do their best to deliver them. Such MTAs are called  open mail relays.This was very important in the early days of the Internet when network connections were unreliable. If an MTA couldn't reach the destination, it could at least deliver it to a relay closer to the destination. The relay stood a better chance of delivering the message at a later time. However, this mechanism proved to be exploitable by people sending  unsolicited bulk email  and as a consequence very few modern MTAs are open mail relays, and many MTAs don't accept messages from open mail relays because such messages are very likely to be spam. ————————————————- [edit]Message formatThe Internet email message format is now defined by  RFC 5322, with multi-media content attachments being defined in  RFC 2045through  RFC 2049, collectively called  Multipurpose Internet Mail Extensions  or  MIME. RFC 5322  replaced the earlier  RFC 2822  in 2008, and in turn  RFC 2822  in 2001 replaced  RFC 822  Ã¢â‚¬â€œ which had been the standard for Internet email for nearly 20 years. P ublished in 1982,  RFC 822  was based on the earlier  RFC 733  for the  ARPANET. [49] Internet email messages consist of two major sections: * Header  Ã¢â‚¬â€œ Structured into  fields  such as From, To, CC, Subject, Date, and other information about the email. Body  Ã¢â‚¬â€œ The basic content, as unstructured text; sometimes containing a  signature block  at the end. This is exactly the same as the body of a regular letter. The header is separated from the body by a blank line. [edit]Message header Each message has exactly one  header, which is structured into  fields. Each field has a name and a value. RFC 5322  specifies the precise syntax. Informally, each line of text in the header that begins with a  printable character  begins a separate field. The field name starts in the first character of the line and ends before the separator character â€Å":†.The separator is then followed by the field value (the â€Å"body† of the field). Th e value is continued onto subsequent lines if those lines have a space or tab as their first character. Field names and values are restricted to 7-bit  ASCII  characters. Non-ASCII values may be represented using MIME  encoded words. Email header fields can be multi-line, and each line ahould be at most 78 characters long and in no event more than 998 characters long. [50]  Header fields defined by  RFC 5322  can only contain  US-ASCII  characters; for encoding characters in other sets, a syntax specified in  RFC 2047  can be used. 51]  Recently the IETF EAI working group has defined some standards track extensions[52][53], replacing previous experimental extensions, to allow  UTF-8  encoded  Unicode  characters to be used within the header. In particular, this allows email addresses to use non-ASCII characters. Such characters must only be used by servers that support these extensions. The message header must include at least the following fields:[54] * From: The  email address, and optionally the name of the author(s). In many email clients not changeable except through changing account settings. Date: The local time and date when the message was written. Like the  From:  field, many email clients fill this in automatically when sending. The recipient's client may then display the time in the format and time zone local to him/her. The message header should include at least the following fields:[55] * Message-ID: Also an automatically generated field; used to prevent multiple delivery and for reference in In-Reply-To: (see below). * In-Reply-To:  Message-ID  of the message that this is a reply to. Used to link related messages together. This field only applies for reply messages.RFC 3864  describes registration procedures for message header fields at the  IANA; it provides for  permanent  and  provisionalmessage header field names, including also fields defined for MIME, netnews, and http, and referencing rele vant RFCs. Common header fields for email include: * To: The email address(es), and optionally name(s) of the message's recipient(s). Indicates primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below. * Subject: A brief summary of the topic of the message. Certain abbreviations  are commonly used in the subject, including  Ã¢â‚¬Å"RE:† and â€Å"FW:†. Bcc:  Blind Carbon Copy; addresses added to the SMTP delivery list but not (usually) listed in the message data, remaining invisible to other recipients. * Cc:  Carbon copy; Many email clients will mark email in your inbox differently depending on whether you are in the To: or Cc: list. * Content-Type: Information about how the message is to be displayed, usually a  MIME  type. * Precedence: commonly with values â€Å"bulk†, â€Å"junk†, or â€Å"list†; used to indicate that automated â€Å"vacation† or â€Å"out of office† responses should not be returned for this mail, e. g. o prevent vacation notices from being sent to all other subscribers of a mailinglist. Sendmailuses this header to affect prioritization of queued email, with â€Å"Precedence: special-delivery† messages delivered sooner. With modern high-bandwidth networks delivery priority is less of an issue than it once was. Microsoft Exchange  respects a fine-grained automatic response suppression mechanism, the X-Auto-Response-Suppress header. [56] * References:  Message-ID  of the message that this is a reply to, and the message-id of the message the previous reply was a reply to, etc. * Reply-To: Address that should be used to reply to the message. Sender: Address of the actual sender acting on behalf of the author listed in the From: field (secretary, list manager, etc. ). * Archived-At: A direct link to the archived form of an individual email message. [57] Note that the  To:  field is not necessarily related to the addresses to which the mess age is delivered. The actual delivery list is supplied separately to the transport protocol,  SMTP, which may or may not originally have been extracted from the header content. The â€Å"To:† field is similar to the addressing at the top of a conventional letter which is delivered according to the address on the outer envelope.In the same way, the â€Å"From:† field does not have to be the real sender of the email message. Some mail servers apply  email authentication  systems to messages being relayed. Data pertaining to server's activity is also part of the header, as defined below. SMTP defines the  trace information  of a message, which is also saved in the header using the following two fields:[58] * Received: when an SMTP server accepts a message it inserts this trace record at the top of the header (last to first). * Return-Path: when the delivery SMTP server makes the  final delivery  of a message, it inserts this field at the top of the header.Ot her header fields that are added on top of the header by the receiving server may be called  trace fields, in a broader sense. [59] * Authentication-Results: when a server carries out authentication checks, it can save the results in this field for consumption by downstream agents. [60] * Received-SPF: stores the results of  SPF  checks. [61] * Auto-Submitted: is used to mark automatically generated messages. [62] * VBR-Info: claims  VBR  whitelisting[63] Filename extensions Upon reception of email messages,  email client  applications save messages in operating system files in the file system.Some clients save individual messages as separate files, while others use various database formats, often proprietary, for collective storage. A historical standard of storage is the  mbox  format. The specific format used is often indicated by special  filename extensions: eml Used by many email clients including  Microsoft Outlook Express,  Windows Mail  and  Mozi lla Thunderbird. The files are  plain text  inMIME  format, containing the email header as well as the message contents and attachments in one or more of several formats. emlx Used by  Apple Mail. msg Used by  Microsoft Office Outlook  and  OfficeLogic Groupware. bx Used by  Opera Mail,  KMail, and  Apple Mail  based on the  mbox  format. Some applications (like  Apple Mail) leave attachments encoded in messages for searching while also saving separate copies of the attachments. Others separate attachments from messages and save them in a specific directory. Lesson 1: Entering Text and Numbers The Microsoft Excel Window Microsoft Excel is an electronic spreadsheet. You can use it to organize your data into rows and columns. You can also use it to perform mathematical calculations quickly. This tutorial teaches Microsoft Excel basics.Although knowledge of how to navigate in a Windows environment is helpful, this tutorial was created for the computer novice . This lesson will introduce you to the Excel window. You use the window to interact with Excel. To begin this lesson, start Microsoft Excel 2007. The Microsoft Excel window appears and your screen looks similar to the one shown here. Note:  Your screen will probably not look exactly like the screen shown. In Excel 2007, how a window displays depends on the size of your window, the size of your monitor, and the resolution to which your monitor is set.Resolution determines how much information your computer monitor can display. If you use a low resolution, less information fits on your screen, but the size of your text and images are larger. If you use a high resolution, more information fits on your screen, but the size of the text and images are smaller. Also, settings in Excel 2007, Windows Vista, and Windows XP allow you to change the color and style of your windows. The Microsoft Office Button In the upper-left corner of the Excel 2007 window is the Microsoft Office button. Wh en you click the button, a menu appears.You can use the menu to create a new file, open an existing file, save a file, and perform many other tasks. The Quick Access Toolbar Next to the Microsoft Office button is the Quick Access toolbar. The Quick Access toolbar gives you with access to commands you frequently use. By default, Save, Undo, and Redo appear on the Quick Access toolbar. You can use Save to save your file, Undo to roll back an action you have taken, and Redo to reapply an action you have rolled back. The Title Bar Next to the Quick Access toolbar is the Title bar. On the Title bar, Microsoft Excel displays the name of the workbook you are currently using.At the top of the Excel window, you should see â€Å"Microsoft Excel – Book1† or a similar name. The Ribbon You use commands to tell Microsoft Excel what to do. In Microsoft Excel 2007, you use the Ribbon to issue commands. The Ribbon is located near the top of the Excel window, below the Quick Access tool bar. At the top of the Ribbon are several tabs; clicking a tab displays several related command groups. Within each group are related command buttons. You click buttons to issue commands or to access menus and dialog boxes. You may also find a dialog box launcher in the bottom-right corner of a group.When you click the dialog box launcher, a dialog box makes additional commands available. The Status bar appears at the very bottom of the Excel window and provides such information as the sum, average, minimum, and maximum value of selected numbers. You can change what displays on the Status bar by right-clicking on the Status bar and selecting the options you want from the Customize Status Bar menu. You click a menu item to select it. You click it again to deselect it. A check mark next to an item means the item is selected. Move Around a Worksheet By using the arrow keys, you can move around your worksheet.You can use the down arrow key to move downward one cell at a time. You can us e the up arrow key to move upward one cell at a time. You can use the Tab key to move across the page to the right, one cell at a time. You can hold down the Shift key and then press the Tab key to move to the left, one cell at a time. You can use the right and left arrow keys to move right or left one cell at a time. The Page Up and Page Down keys move up and down one page at a time. If you hold down the Ctrl key and then press the Home key, you move to the beginning of the worksheet. EXERCISE 1 Move Around the WorksheetThe Down Arrow Key Press the down arrow key several times. Note that the cursor moves downward one cell at a time. The Up Arrow Key Press the up arrow key several times. Note that the cursor moves upward one cell at a time. The Tab Key Move to cell A1. Press the Tab key several times. Note that the cursor moves to the right one cell at a time. The Shift+Tab Keys Hold down the Shift key and then press Tab. Note that the cursor moves to the left one cell at a time. Th e Right and Left Arrow Keys Press the right arrow key several times. Note that the cursor moves to the right.Press the left arrow key several times. Note that the cursor moves to the left. Page Up and Page Down Press the Page Down key. Note that the cursor moves down one page. Press the Page Up key. Note that the cursor moves up one page. The Ctrl-Home Key Move the cursor to column J. Stay in column J and move the cursor to row 20. Hold down the Ctrl key while you press the Home key. Excel moves to cell A1. Go To Cells  Quickly The following are shortcuts for moving quickly from one cell in a worksheet to a cell in a different part of the worksheet. EXERCISE 2 Go to — F5 The F5 function key is the â€Å"Go To† key.If you press the F5 key, you are prompted for the cell to which you wish to go. Enter the cell address, and the cursor jumps to that cell. Press F5. The Go To dialog box opens. Type  J3  in the Reference field. Press Enter. Excel moves to cell J3. Go to — Ctrl+G You can also use Ctrl+G to go to a specific cell. Hold down the Ctrl key while you press â€Å"g† (Ctrl+g). The Go To dialog box opens. Type  C4  in the Reference field. Press Enter. Excel moves to cell C4. The Name Box You can also use the Name box to go to a specific cell. Just type the cell you want to go to in the Name box and then press Enter.If you wish to perform a function on a group of cells, you must first select those cells by highlighting them. The exercises that follow teach you how to select. EXERCISE 3 Select Cells To select cells A1 to E1: Go to cell A1. Press the F8 key. This anchors the cursor. Note that â€Å"Extend Selection† appears on the Status bar in the lower-left corner of the window. You are in the Extend mode. Click in cell E7. Excel highlights cells A1 to E7. Press Esc and click anywhere on the worksheet to clear the highlighting. Alternative Method: Select Cells by DraggingYou can also select an area by holding down th e left mouse button and dragging the mouse over the area. In addition, you can select noncontiguous areas of the worksheet by doing the following: Go to cell A1. Hold down the Ctrl key. You won't release it until step 9. Holding down the Ctrl key enables you to select noncontiguous areas of the worksheet. Press the left mouse button. While holding down the left mouse button, use the mouse to move from cell A1 to C5. Continue to hold down the Ctrl key, but release the left mouse button. Using the mouse, place the cursor in cell D7. Press the left mouse button.While holding down the left mouse button, move to cell F10. Release the left mouse button. Release the Ctrl key. Cells A1 to C5 and cells D7 to F10 are selected. Press Esc and click anywhere on the worksheet to remove the highlighting. Enter Data In this section, you will learn how to enter data into your worksheet. First, place the cursor in the cell in which you want to start entering data. Type some data, and then press Enter . If you need to delete, press the Backspace key to delete one character at a time. EXERCISE 4 Enter Data Place the cursor in cell A1. Type  John Jordan. Do not press Enter at this time.Delete Data The Backspace key erases one character at a time. Press the Backspace key until Jordan is erased. Press Enter. The name â€Å"John† appears in cell A1. Edit a Cell After you enter data into a cell, you can edit the data by pressing F2 while you are in the cell you wish to edit. EXERCISE 5 Edit a Cell Change â€Å"John† to â€Å"Jones. † Move to cell A1. Press F2. Use the Backspace key to delete the â€Å"n† and the â€Å"h. † Type  nes. Press Enter. Lesson 2: Entering Excel Formulas and Formatting Data Lesson 1 familiarized you with the Excel 2007 window, taught you how to move around the window, and how to enter data.A major strength of Excel is that you can perform mathematical calculations and format your data. In this lesson, you learn how to per form basic mathematical calculations and how to format text and numerical data. To start this lesson, open Excel. Set the Enter Key Direction In Microsoft Excel, you can specify the direction the cursor moves when you press the Enter key. In the exercises that follow, the cursor must move down one cell when you press Enter. You can use the Direction box in the Excel Options pane to set the cursor to move up, down, left, right, or not at all.Perform the steps that follow to set the cursor to move down when you press the Enter key. Click the Microsoft Office button. A menu appears. Click Excel Options in the lower-right corner. The Excel Options pane appears. Click Advanced. If the check box next to After Pressing Enter Move Selection is not checked, click the box to check it. If Down does not appear in the Direction box, click the down arrow next to the Direction box and then click Down. Click OK. Excel sets the Enter direction to down. Perform Mathematical Calculations In Microsoft Excel, you can enter numbers and mathematical formulas into cells.Whether you enter a number or a formula, you can reference the cell when you perform mathematical calculations such as addition, subtraction, multiplication, or division. When entering a mathematical formula, precede the formula with an equal sign. Use the following to indicate the type of calculation you wish to perform: + Addition – Subtraction * Multiplication / Division ^ Exponential In the following exercises, you practice some of the methods you can use to move around a worksheet and you learn how to perform mathematical calculations. Refer to Lesson 1 to learn more about moving around a worksheet. EXERCISE 1Addition Type  Add  in cell A1. Press Enter. Excel moves down one cell. Type  1  in cell A2. Press Enter. Excel moves down one cell. Type  1  in cell A3. Press Enter. Excel moves down one cell. Type  =A2+A3  in cell A4. Click the check mark on the Formula bar. Excel adds cell A1 to cel l A2 and displays the result in cell A4. The formula displays on the Formula bar. Note:  Clicking the check mark on the Formula bar is similar to pressing Enter. Excel records your entry but does not move to the next cell. Subtraction Press F5. The Go To dialog box appears. Type  B1  in the Reference field. Press Enter. Excel moves to cell B1.Type  Subtract. Press Enter. Excel moves down one cell. Type  6  in cell B2. Press Enter. Excel moves down one cell. Type  3  in cell B3. Press Enter. Excel moves down one cell. Type  =B2-B3  in cell B4. Click the check mark on the Formula bar. Excel subtracts cell B3 from cell B2 and the result displays in cell B4. The formula displays on the Formula bar. Multiplication Hold down the Ctrl key while you press â€Å"g† (Ctrl+g). The Go To dialog box appears. Type  C1  in the Reference field. Press Enter. Excel moves to cell C1 Type  Multiply. Press Enter. Excel moves down one cell. Type  2  in cell C2. Press Enter. Excel moves down one cell.Type  3  in cell C3. Press Enter. Excel moves down one cell. Type  =C2*C3  in cell C4. Click the check mark on the Formula bar. Excel multiplies C1 by cell C2 and displays the result in cell C3. The formula displays on the Formula bar. Division Press F5. Type  D1  in the Reference field. Press Enter. Excel moves to cell D1. Type  Divide. Press Enter. Excel moves down one cell. Type  6  in cell D2. Press Enter. Excel moves down one cell. Type  3  in cell D3. Press Enter. Excel moves down one cell. Type  =D2/D3  in cell D4. Click the check mark on the Formula bar. Excel divides cell D2 by cell D3 and displays the result in cell D4.The formula displays on the Formula bar. When creating formulas, you can reference cells and include numbers. All of the following formulas are valid: =A2/B2 =A1+12-B3 =A2*B2+12 =24+53 AutoSum You can use the AutoSum button  Ã‚  on the Home tab to automatically add a column or row of numbers. When you press the AutoSum button  , Excel selects the numbers it thinks you want to add. If you then click the check mark on the Formula bar or press the Enter key, Excel adds the numbers. If Excel's guess as to which numbers you want to add is wrong, you can select the cells you want. EXERCISE 2 AutoSum The following illustrates AutoSum:Go to cell F1. Type  3. Press Enter. Excel moves down one cell. Type  3. Press Enter. Excel moves down one cell. Type  3. Press Enter. Excel moves down one cell to cell F4. Choose the Home tab. Click the AutoSum button  Ã‚  in the Editing group. Excel selects cells F1 through F3 and enters a formula in cell F4. Press Enter. Excel adds cells F1 through F3 and displays the result in cell F4. Perform Automatic Calculations By default, Microsoft Excel recalculates the worksheet as you change cell entries. This makes it easy for you to correct mistakes and analyze a variety of scenarios. EXERCISE 3 Automatic CalculationMake the changes described be low and note how Microsoft Excel automatically recalculates. Move to cell A2. Type  2. Press the right arrow key. Excel changes the result in cell A4. Excel adds cell A2 to cell A3 and the new result appears in cell A4. Move to cell B2. Type  8. Press the right arrow key. Excel subtracts cell B3 from cell B3 and the new result appears in cell B4. Move to cell C2. Type  4. Press the right arrow key. Excel multiplies cell C2 by cell C3 and the new result appears in cell C4. Move to cell D2. Type  12. Press the Enter key. Excel divides cell D2 by cell D3 and the new result appears in cell D4.Align Cell Entries When you type text into a cell, by default your entry aligns with the left side of the cell. When you type numbers into a cell, by default your entry aligns with the right side of the cell. You can change the cell alignment. You can center, left-align, or right-align any cell entry. Look at cells A1 to D1. Note that they are aligned with the left side of the cell. Microso ft Excel 2007 – It is a program used to create, format, and compute numbers. It displays datain row-and-column format. MS Excel makes it easy to compute numbers andallows different ways to format data including charts and reports. It is a very powerful electronic spreadsheet that lets the user enter and usenumerical data with formulas and built-in functions. It consists of 16worksheets, 65536 rows, and 256 columns. A Workbook is a file in MS Excel that holds worksheets. A Worksheet is composed of columns and rows that are similar to an accounting ledger. Itdisplays characters like letters, and numbers, and can do computations. Parts and Uses of the MS Excel Environment 1. Toolbars – display commands that are commonly used for easy access 2. Name Box – displays the address of the active cell 3. Formula bar displays the contents and formula entered on the active cell 4. Status bar – displays the information about a selected command 5. Select all Button â₠¬â€œ selects every cell in a worksheet 6. Sheet Tabs – let you display worksheets in the open workbook 7. Row headers – a number used to identify a row 8. Column headers – a letter used to identify a column 9. Active cell – the cell that has a thick border that will hold any data that you type or  entered 10. Scroll bars – includes vertical and horizontal scroll bar and four arrow used to move thescreen display horizontally or vertically 11. Title bar displays the program and the name of the workbook that you are currentlyusing 12. Menu bar (7 Tabs) – lists the names of the menus or tabs in Excel 13. Minimize button – minimizes the window to a button on the task bar 14. Maximize/Restore button – switch between maximizing a window and restoring awindow to its previous size 15. Close button – closes the window Parts of the Microsoft Office Excel 2007 Environment Parts of the PowerPoint screen: * Title bar  Ã¢â‚¬â€œ dis plays the document name * Menu bar  Ã¢â‚¬â€œ click on a menu option to see a list of commands * Standard toolbar  Ã¢â‚¬â€œ frequently used menu options Formatting toolbar  Ã¢â‚¬â€œ displays formatting commands * Placeholder  Ã¢â‚¬â€œ click or double-click to add an element to a slide * Outline view button  Ã¢â‚¬â€œ displays document in outline form * Slide view button  Ã¢â‚¬â€œ displays slides one at a time * Slide Sorter view button  Ã¢â‚¬â€œ displays all slides in a single screen * Slide show button  Ã¢â‚¬â€œ displays slide show * Drawing toolbar  Ã¢â‚¬â€œ displays drawing tools * Status bar  Ã¢â‚¬â€œ shows the current page number and position of the insertion point in the document * Office Assistant  Ã¢â‚¬â€œ quick help when you need it This lesson introduces you to  PowerPoint 2007.You use the PowerPoint window to interact with the software, place text, graphics, and other features on a slide. When you launch PowerPoint 2007, the PowerPoint 2007 Window ap pears and your screen looks like the one shown below. Your PowerPoint 2007 Window screen will probably not look exactly like the screen shown above. In PowerPoint 2007, how a window displays depends on the size of the window, the size of your monitor, and the resolution to which your monitor is set. Screen Resolution determines how much information your computer monitor can display.If you use a low resolution, less information fits on your screen, but the size of your text and images are larger. If you use a high resolution, more information fits on your screen, but the size of the text and images are smaller. The Microsoft Office Button In the upper-left corner of the PowerPoint 2007 window is the Microsoft Office button. It's similar to the old File Menu. When you click the button, a menu appears. You can use the menu to create a new file, open an existing file, save a file, print, and perform many other tasks. The Quick Access ToolbarNext to the Microsoft Office button in the upp er left corner is the Quick Access toolbar outlined in red in the image above. The Quick Access toolbar provides you with access to commands that are frequently used. By default, Save, Undo, and Redo appear on the Quick Access toolbar. You use Save to save your file, Undo to rollback an action you have taken, and Redo to reapply an action you have rolled back. You can customize this toolbar by right clicking on it or click the small black down arrow to the right. The Title Bar The Title bar is located at the top in the center of the PowerPoint 2007 window.The Title bar displays the name of the presentation on which you are currently working. By default, PowerPoint names presentations sequentially, starting with Presentation1. When you save your file, you can change the name of your presentation. The Ribbon The  Ribbon  holds all of the commands and features of each of the tabs in the Ribbon. The Tabs are located across the top of the ribbon under the Title Bar. These contextual tabs will appear when you have something highlighted that calls for it. For example, if you have a picture highlighted on your slide, a Picture Tools tab will appear.Similar tools are located in Command Groups across the ribbon. Each Command Group includes Command Buttons to perform various actions on that group of tools. Getting PowerPoint to Do What You Want You use commands to tell PowerPoint what to do. In PowerPoint 2007, the commands you use are located on the the Ribbon. The Ribbon is located near the top of the PowerPoint 2007 window, below the Quick Access toolbar. At the top of the Ribbon are several tabs and clicking a tab displays several related command groups. Within each group are related command buttons. You click buttons to issue commands or to access menus and dialog boxes.You may also find a dialog box launcher in the bottom-right corner of a group. When you click the dialog box launcher, a dialog box makes additional commands available. Clipboard  Ã¢â‚¬â€œ Cont ains the cut, copy, paste commands. The Format Painter tool is located here as are the Paste Special, Paste as Hyperlink, and Duplicate commands. Slides  Ã¢â‚¬â€œ All the commonly used commands for creating new slides Font  Ã¢â‚¬â€œ Includes the most commonly used commands for formatting font Paragraph  Ã¢â‚¬â€œ Includes all of the paragraph formatting commands, vertical and horizontal alignments, text direction, bullets, numbering, indenting, spacing before and after, columns, etc.It also includes the dialog box for tabs. Drawing  Ã¢â‚¬â€œ Allow you to add shapes and draw on your slides. This is Format Shape Dialog Box. Rulers Rulers are vertical and horizontal guides. You use them to determine where you want to place an object. If the rulers do not display in your PowerPoint 2007 window: 1. Click the View tab. 2. Click Ruler in the Show/Hide group. The rulers appear. Slides, Placeholders, and Notes The Slide Window is broken up into several areas including the Slide Pane a nd the Notes Section. The Slide Pane appears in the center of the window while the Notes Section is at the bottom.There are also Placeholders on each slide depending on the slide layout that has been selected. These layouts may include placeholders for a slide title, subtitle, text, images, video, charts, graphs, etc. The placeholders hold the objects on your slides. Slides appear in the center of the window. You create your presentation by adding content to the slides. You can use the notes area to creates notes to yourself. You can refer to these notes as you give your presentation. For narrated presentations, this area is frequently used to write the script for the audio. Main Window Components, Status Bar, Tabs, View Buttons, and MoreThe Status bar generally appears at the bottom of the window. The Status bar displays the number of the slide that is currently displayed, the total number of slides, and the name of the design template in use or the name of the background. The Outl ine tab displays the text contained in your presentation in an outline format. The Slides tab displays a thumbnail view of all your slides. You click the thumbnail to view the slide in the Slide pane. The View buttons appear near the bottom of the screen. You use the View buttons to change between Normal view, Slider Sorter view, and the Slide Show view. Normal ViewNormal view splits your screen into three major sections: the Outline and Slides tabs, the Slide pane, and the Notes area. The Outline and Slides tabs are on the left side of your window. They enable you to shift between two different ways of viewing your slides. The Slides tab shows thumbnails of your slides. The Outline tab shows the text on your slides. The Slide pane is located in the center of your window. The Slide pane shows a large view of the slide on which you are currently working. The Notes area appears below the Slide pane. You can type notes to yourself on the Notes area. Slide Sorter ViewSlide Sorter view s hows thumbnails of all your slides. In Slide Sorter view, you can easily add, delete, or change their order of your slides. Slide Show View Use the Slide Show view when you want to view your slides, as they will look in your final presentation. When in Slide Show view: Esc| Returns you to the view you were using previously. | Left-clicking| Moves you to the next slide or animation effect. When you reach the last slide, you automatically return to your previous view. | Right-clicking| Opens a pop-up menu. You can use this menu to navigate the slides, add speaker notes, select a pointer, and mark your presentation. |Zoom In & Zoom Out Zoom controls allows you to zoom in and zoom out on the window. Zooming in makes the window larger so you focus in on an object. Zooming out makes the window smaller so you can see the entire window. You can click and drag the vertical and horizontal splitter bars to change the size of your panes. What is a computer virus? A computer virus is a small sof tware program that spreads from one computer to another and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk.Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or you are expecting the email attachment. Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download. Symptoms of a computer virus For information about the symptoms of a computer virus, go to the   Microsoft PC Security  website. What is a worm?A worm is computer code that spreads without user interaction. Most worms begin as email attac hments that infect a computer when they're opened. The worm scans the infected computer for files, such as address books or temporary webpages, that contain email addresses. The worm uses the addresses to send infected email messages, and frequently mimics (or spoofs) the â€Å"From† addresses in later email messages so that those infected messages seem to be from someone you know. Worms then spread automatically through email messages, networks, or operating system vulnerabilities, frequently overwhelming those systems before the cause is known.Worms aren't always destructive to computers, but they usually cause computer and network performance and stability problems. What is a trojan horse? A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Trojan horses do not usuall y spread by themselves. They are spread by viruses, worms, or downloaded software. What is spyware? Spyware can install on your computer without your knowledge.These programs can change your computer’s configuration or collect advertising data and personal information. Spyware can track Internet search habits and can also redirect your web browser to a different website than you intend to go to. What is rogue security software? A rogue security software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that removes the virus. The names of these products frequently contain words like Antivirus, Shield, Security, Protection, or Fixer. This makes them sound legitimate.They frequently run right after you download them, or the next time that your computer starts. Rogue security software can prevent applications, such as Internet Explorer, from opening. Rogue security software might also display legitimate and important Windows files as infections. Typical error messages or pop-up messages might contain the following phrases: Warning! Your computer is infected! This computer is infected by spyware and adware. Note  If you receive a message in a popup dialog box that resembles this warning, press  ALT + F4  on your keyboard to close the dialog box.Do not click anything inside the dialog box. If a warning, such as the one here, keeps appearing when you try to close the dialog box, it’s a good indication that the message is malicious. Are you sure you want to navigate from this page? Your computer is infected! They can cause data lost and file corruption and need to be treated as soon as possible. Press CANCEL to prevent it. Return to System Security and download it to secure your PC. Press OK to Continue or Cancel to stay on the current page. If you see this kind of message, then don't download or buy the software.What is malware? Malware is a term that is used for malicio us software that is designed to do damage or unwanted actions to a computer system. Examples of malware include the following: Viruses Worms Trojan horses Spyware Rogue security software How to remove malware such as a virus, spyware, or rogue security software Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed.Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software. For more information about how to remove a computer virus and spyware, see the following article in the Microsoft Knowledge Base: 2671662 – Microsoft resources and guidance for removal of malware and viruses Note  If you cannot access the Internet on your computer, use another computer to help you follow the steps in the â€Å"How to reset your Internet Explorer proxy settings† section on the computer that may be infected.To remove a computer virus and other malicious software, follow these steps in order. Install the latest updates from Microsoft Update Note  A computer virus may prevent you from accessing the Microsoft Update website to install the latest updates. We recommend that you set the Automatic Updates service  to run automatically so that a computer is not missing any important updates. For more information, see the following article in the Microsoft Knowledge Base:   306525 – How to configure and use Automatic Updates in Windows Windows Vista  and  Windows 7 Click  Start, and then type  Windows Update  in the search box.In the results area, click  Windows Update. Click  Check for Updates. Follow the instructions to download and install the latest Windows Updates. Windows XP Click  Start, and then click  Run. Type  sysdm. cpl, and then press Enter. Click the  Automatic Updates  tab, and then click the  Automatic (recommended)  option. Click  OK. Use the free Microsoft Safety Scanner Microsoft offers a free online tool that scans and helps remove potential threats from your computer. To perform the scan, go to the  Microsoft Safety Scanner  website. Use the Windows Malicious Software Removal ToolFor more information about the Microsoft Malicious Software Removal Tool, see the following article in the Microsoft Knowledge Base: 890830 – The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows 7, Windows Vista, Windows Server 2003, Windows Server 2008, or Windows XP Manually remove the rogue security software If the rogue security software can’t be detected or removed by using Microsoft Safety Scanner or the Windows Malicious Software Removal Tool, try the following steps: Note the name of the rogue security software.For this example, we'll call i t  XP Security Agent 2010. Restart your computer. When you see the computer's manufacturer's logo, repeatedly press the  F8  key. When you are prompted, use the arrow keys to highlight  Safe Mode with Networking, and then press Enter. Click  Start  and check whether the rogue security software appears on the  Start  menu. If it's not listed there, clickAll Programs  and scroll to find the rogue security software's name. Right-click the name of the rogue security software program, and then click  Properties. Click the  Shortcut  tab.In the  Properties  dialog box, check the path of the rogue security software program that is listed in  Target. For example,  C:Program FilesXP Security Agent 2010. Note  The folder name frequently is a random number. Click  Open File Location. In the  Program Files  window, click  Program Files  in the address bar. Scroll until you find the rogue security software program folder. For example,  XP Security Ag ent 2010. Right-click the folder, and then click  Delete. Restart your computer. Go to the  Microsoft Safety Scanner  website. Follow the steps to run the scan and to help remove the rogue security software.If you suspect that your computer is infected with rogue security software that was not detected by using Microsoft security solutions, you can submit samples by using the  Microsoft Malware Protection Center submission form. For more information about rogue security software, go to the  Watch out for fake virus alerts  website. Install and run Microsoft Security Essentials Microsoft offers a free malicious removal program called Microsoft Security Essentials that helps protect your computer from becoming infected. To install Microsoft Security Essentials, follow these steps: Go to the  Microsoft Security Essentials  website.Click  Free Download. Click  Run, and then follow the instructions to install Microsoft Security Essentials. After installation, restart your computer. Click  Start, click  All Programs, and then click  Microsoft Security Essentials. On the  Home  tab, select the  Full  scan option, and then click  Scan now. Install Windows Defender Offline Windows Defender Offline is a malware tool that helps remove difficult to eliminate viruses that start before Windows starts. To use Windows Defender Offline, follow these steps: On an uninfected computer, go to the  What is Windows Defender Offline  website.Click  Download the 32 bit version  or  Download the 64 bit version, depending on which operating system that you are running. If you're unsure of which operating system that you are running, go to the  Is my PC running the 32-bit or 64-bit version of Windows  website. When you are prompted, click  Save As, and then save the file to a DVD, CD, or USB flash drive. On the infected computer, insert the DVD, CD, or USB flash drive, and then restart the computer. When you are prompted, press a key to select an option to use to start your computer, such as F12, F5, or F8, depending on the kind of computer that you are using.Use the arrow key to scroll to the drive where you installed Windows Defender Offline file. Windows Defender Offline starts and immediately scans for malware. For more information about how to remove a computer virus, go to the  How do I remove a computer virus  website. How to protect your computer against malware There are actions that you can take to help protect your computer against malware. Turn on the firewall For information about how to turn on your firewall in Windows 7, go to the  Turn Windows 7 Firewall on or offwebsite.For information about how to turn on your firewall in Windows Vista, go to the  Turn Windows Vista Firewall on or off  website. For information about how to turn on your firewall in Windows XP, see the following article in the Microsoft Knowledge Base: 283673 – How can I turn on or turn off the firewall in Windows XP Service Pack 2 or later versions? Keep your computer up to date For more information about how to set Automatic Updates in Windows, see the following article in the Microsoft Knowledge Base: 306525 – How to configure and use Automatic Updates in Windows Install Microsoft Security Essentials and keep it up to dateFor more information about how to install and use Microsoft Security Essentials, go to the  Microsoft Security Essentialswebsite. Don’t be tricked into downloading malware Here are some tips that can help protect you from downloading software that you don't want: Only download programs from websites that you trust. If you're not sure whether to trust a program that you want to download, enter the name of the program into your favorite search engine to see whether anyone else has reported that it contains spyware. Read all security warnings, license agreements, and privacy statements that are associated with any software that you download.Never click  "Agree† or â€Å"OK† to close a window that you suspect might be spyware. Instead, click the red â€Å"x† in the corner of the window or press  Alt + F4  on your keyboard to close a window. Be wary of popular â€Å"free† music and movie file-sharing programs, and make sure that you understand all the software packaged with those programs. Use a standard user account instead of an administrator account. For more information, go to the  Why use a standard account instead of an administrator account  website. For more information about how to protect a computer against viruses, go to the  How to boost your malware defense and protect your PC  website.How to reset your Internet Explorer proxy settings Malicious software might change Internet Explorer proxy settings, and these changes can prevent you from accessing Windows Update or any Microsoft Security sites. To have us change your Internet Explorer proxy settings for you, follow these steps: On an uninfected computer, see the following article in the Microsoft Knowledge base: 2289942 – How to reset your Internet Explorer proxy settings Go to the  Fix it for me  section. Click the  Fix it  button. Save the file to a flash drive or a CD when you are prompted. Insert the flash drive or CD in the infected computer.Start Windows, click  Start, and then click  Run. Click  Browse. Select the location of the flash drive or CD. Double-click the file that you saved, and then click  Open. To change your Internet Explorer proxy settings yourself, follow these steps: Click  Start, and then click  Run. In the  Run  box, copy and paste the following: reg add â€Å"HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings† /v ProxyEnable /t REG_DWORD /d 0 /f Click  OK. Click  Start, and then click  Run. In the  Run  box, copy and paste the following: reg delete â€Å"HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings† /v Pr oxyServer /f Click  OK.