Monday, September 30, 2019

Key Differences Between Nature And Nurture Theories Psychology Essay

Nature/Nurture I will be looking at the effects of Eminem’s life and relating it to nature or nurture. This debate has been around a long time. Gesell developed the maturation theory which is based on the nature side of the debate he believed that development was a result of maturation for example; learning to walk and puberty. Nature Nature refers to the characteristics we have due to our genetics and what biological traits we inherit. Physical similarities are usually inherited from your parents such as eye color and pigment of skin. This is due to nature. Certain illnesses can also be linked to nature such as breast cancer, this can be linked to family members. This will decrease the life expectancy of the person. It can also be said that we inherit our intellect for example, how intelligent and smart we are. It is said that if our parents are intelligent individuals we may too have the potential to be intelligent as this has been passed down in our genes. It is also the same as having a low IQ. We can also inherit personality traits due to nature, this can be either a calm and shy personality or an angry and violent one. It is thought that a child who has anger management issues or issues with violence may not always be acting as a result of growing up in that environment, this could be inherited through their genes passed down from one or both parents. Nurture Nurture refers to the environment that a person has grown up in. this is strongly linked to seeing your parents or other family members acting a certain way and copying it. It is said that children behave in a particular way as they have witnessed this going on around them. An example of this would be if they had grown up in violence they may learn this type of behavior and act upon it. They may not have grown up in a violent home but they may surround themselves with friends or a particular environment where violence is accepted and modeled. Maturation theory The maturation theory was first introduced by American Professor Dr. Arnold Gesell, the maturation theory refers to the physical and the mental growth of individuals, this growth is determined by Biology, genes, and the environment. Gesell declared that all children go through the same stages of development in the same sequence but each child will move through these stages at their own rate. Gesell believed that a child’s growth and development are influenced by both the environment that surrounds them and the person genes. He largely focused on the child’s physiological development. He called this process maturation which was mainly made up of and controlled by genes. According to Gesell, the rate that children develop is down to the growth of the child’s nervous system. As the nervous system grows, their minds develop and their behavior will change. Biological programming Biological programming is your genetics. Genes provide the instructions for structuring amino acids. Our body shape, size, behavior all depend on the interaction

Sunday, September 29, 2019

Duties of a Citizen

Recently you wonaâ‚ ¬Ã¢â€ž ¢t be seeing an American citizen care much about anything other than them selves. Their main priority is to ensure the perfection of their own lives. That is not being a good citizen though. Making sure your needs are met before you look up and see what you can help with is corrupt and selfish. We need to care more about how we can help our country and what we need to do to be a good citizen. Having clear goals, consistent ideals, and unity is what makes a country powerful; so when any of these components are lacking, a country and its citizens will weaken, which is happening in America. Being a citizen of America has become virtually insignificant to our people, and is now crippling us. These three components depend upon one another to ensure the strength of a country. We must value all these elements to check our loyalty for our countries endeavors. Specifically the ideals should be based on the standards your country wants, since it is the structure to your countryaâ‚ ¬Ã¢â€ž ¢s government. But ideals consist of what you and your country should value in your beliefs, ethics, and principals so the people can jointly support their country. Our ideals (especially American) have been accepted by each subsequent generation until recently. Unity is a common understanding and belief within a group of people; it is joining together for an ultimate cause. Goals are the start of our countries ambition to aim for our desired result and produce the product of our efforts. The ideals however establish a consensus on what we value or believe in as a country, it creates boundaries on our moral standard. We have to stay true to our constitution and the morals that were founded with it. To stray off and feel superior to your own ideals is no exception. That is what breaks the core and ruins our countries long lasting policies. Being a country of the people, for everything from the military to the government to the public should be equally united in the same goals. The government however is the power that should listen then voice the verdict of our decisions. They should act upon the publicaâ‚ ¬Ã¢â€ž ¢s best interests, and not single out any party or group whose stance on a matter should be determined as any less significant. If a decision is detrimental to anyoneaâ‚ ¬Ã¢â€ž ¢s life in the general public, then it is likely there will be more than one person affected by the same things. The government should act upon their doings with precision and a conscious understanding of their impact on everyone. Dependant on the necessity of their actions an act should not be passed if it is going to exclude even a minority in the populations opinions. With this we can determine clear goal sets and be unified. When going through with anything you should always check your tracks to see if you stomped on any bugs. Through out the Vietnam War these ingredients were missing for the American position. It doesnaâ‚ ¬Ã¢â€ž ¢t matter if the opponent is right or wrong, but if you are following these tactics, you will be successful. Ho Chi Minh and his communist following was ensuing power through authority and fear. Due to the fear he was possessing in many of the Vietnamese civilians, he was able to create unity for the goal sets he was trying to reach. His methods consisted of using fear over his people to squeeze out the product he desired. Once the people saw the product he achieved by communist ideals, Minh created a massive following of communist believers to ensure the continuation of reaching their goals and his regime. He established groups such as the NLF to spread his ideals and expand his following, but also to support all sections of his military. They believed that aâ‚ ¬? as long as they did not lose, they won. aâ‚ ¬? Americans on the other hand should have seen their defeat coming. Constantly reflecting on the Korean War as aâ‚ ¬? learning our lesson,aâ‚ ¬? we should have taken the French defeat in Dien Bien Phu as a warning. Americans entered the war, head first with no structure of unity, goal sets, or ideals. Events such as the Tet Offensive had not only initiated a new phase of the war but also showed us that our unity was weak. The US, if unified would have been smarter to not abandon all their cities and create opportunity for the NLF and Vietcong to strike. We would have communicated and sorted our priorities to know our goals before separating into remote areas. Other battles like Ia Drang showed the issues with unity and goals that have become noticed because of the failure to succeed in communication during them. The Pentagon Papers along with some accumulating underground news articles revealed much of what went wrong to the public in 1971. When the Americans had already initiated Vietnamization it was to late to change our strategy for the war effort. The papers caused discourse within our own country and distrust of our government. They were one of the large breaking points to all the built up distress over the war. In the papers we lied about the Gulf of Tokin aâ‚ ¬? attackaâ‚ ¬? and covered up our faults to our own people. Events such as My Lai concerning Lieutenant William Calley posed even more issues on the moral justification we had in Vietnam, for such things as our aâ‚ ¬? Free Fire Policyaâ‚ ¬? or aâ‚ ¬? Search and Destroy Campaign. aâ‚ ¬? It showed that Americans went against their own ideals when in Vietnam by not treating the Vietnamese with equal liberties, as we would give ourselves. It seemed as though we held a higher standing for ourselves when in Vietnam so we did not follow our own belief of treating all humans as equals. Killing innocent civilians without trial, not accepting the cultural difference of nations, using the threat of arms as a bribe to follow our beliefs, treating foreigners with out equality, ect. It was all that went wrong in our approach to try and gain the Vietnamese trust. When we went over to Vietnam we showed, a third world country in despair, a country that does not constitute itself by the ideals we arrived there with. In fact we did the exact things we were fighting against and did what we originally founded ourselves to not become, in Vietnam. It was a hypocritical scenario where we couldnaâ‚ ¬Ã¢â€ž ¢t learn from our mistakes until we were gone and had already lost. In present day Afghan/ Iraq with many of those mistakes from Vietnam still hanging over our heads, we are now pushing to fix. Since Vietnam we have initiated the Special Operations Unit, and founded many other sections of the Military to ensure we donaâ‚ ¬Ã¢â€ž ¢t make those same mistakes. Although many things are still missing from our strategy, such as going against our ideals again in the case of Abu Ghraib, we have come a long way. A friend of mine, Richard Bennett, currently serving in the US Special Opps. Group, and waiting to be deported to Afghan/ Iraq is anxious to utilize his training. His job will be to train civilians on how to protect and sustain their own government, so they can stand on their own. He has gone through rigorous training to ensure his capability in every situation but as his mother said to me in her interview, aâ‚ ¬? Richie is anxious to be deported and utilize his trainingaâ‚ ¬Ã‚ ¦ but he has expressed his frustrations with the politics concerning the waraâ‚ ¬Ã‚ ¦ like I said, it is the Age of Information, so you can see multiple sides to every story now. aâ‚ ¬? Essentially her point was to express that even if there is corruption in Afghan/ Iraq there is practically nothing the public cant obtain information on. The publicaâ‚ ¬Ã¢â€ž ¢s judgment on the issues should be heard and taken into consideration by the government to change what they feel is not right based on our ideals. Finally, when analyzing the trends and mistakes we made in Vietnam there is significant improvement of our structure in Afghanistan/ Iraq now. Even though we still have our defects as citizens, we should always remember the three components to being successful as a country and as a citizen of that country. The unity, goals, and ideals of a country found their infrastructure. So to be a good citizen you have to work to maintain that, for your country, and for the future of your country.

Saturday, September 28, 2019

Developmental Psychology Term Paper

Essay Assignment 2 Rebecca’s Rebellion 1. Describe the changes in physical growth and development that she would have experienced in the past 3-4 years and how these changes could be impacting her current state. A number of factors have contributed to Rebecca’s current rebellion against her parents, most of them being normal and healthy parts of development.However, it would seem that one aspect of her physical development somewhat strayed from the normative; an issue that, according to several findings in the field of developmental psychology, has had a negative catalyzing effect on her body image, peer-acceptance, relationship with her parents, and overall emotional stability. This umbrella issue is Rebecca’s pubertal timing; specifically, the early onset of it relative to her peers. As cited in our textbook, from several different studies, â€Å"(E)arly-maturing girls were unpopular with -drawn lacking in self-confidence, anxious, and prone to depression, (â € ¦ were more involved in deviant behavior (getting drunk, participating in early sexual activity) and achieved less well in school. † This behavioral trend is mostly reflected in Rebecca, who as early as 10-11, hit a growth spurt that made her much taller and leaner, â€Å"such a notable growth spurt often signals the coming of menarche within a six month period,† and as early as 12 year old became both sexually attracted to men, and began developing an unhealthy self-image in the form of a perceived weight problem as a result of gained weight in the hips, â€Å"another common signal of menarche. The trend of early onset puberty in caucasian girls has been demonstrated to impact both body-image and self-esteem as a result of their awkward and differing appearance to their peers as well as the hormonal influenced emotional changes that are typical of early adolescence. Often a result of this desire for peer-acceptance, early-onsetters tend to gravitate towards older and more sexually matured individuals who match their stage of pubertal development, and â€Å"who often encourage them into activities they are not ready to handle emotionally, including sexual activity, drug and alcohol use, and minor delinquent acts. Rebecca has engaged in somewhat delinquent behavior from time to time prior to early adolescence, but with the exception of her little ruining the neighbor’s garden stint, she has been completely in accordance with the law, and ultimately respectful of following house rules. However, the influence of this garden-trampling partner in crime is still most likely a contributing factor to Rebecca’s current state of rebellion. Early-onset puberty aside, a desire for distance from one’s parents at this age is a completely normal, evolutionary-based aspect of human development.It is a behavior replicated in primates, as it is ultimately a nature-based mechanism which serves to, â€Å"discourage sexual relations between close blood relatives. † Even in our modern American society, such behavior is replicated, albeit in a fundamentally different way; â€Å"(A)dolescents in industrialized nations, who are still economically dependent on parents, cannot leave the family. Consequently, a modern substitute seems to have emerged: psychological distancing. Rebecca’s unique physical development has most likely been a large contributing factor on her current behavior via its effect on her self-image. Though it might be a large part of current state, and perhaps the primary catalyst, it is not the end-all be-all of it so much as its part of a complex mixture with her relationship with us, people her age, and other environment related factors. 2) Describe the stages of cognitive and moral development in this developmental period as theorized by Piaget and Kohlberg.Present evidence (from her developmental history information) for which stage you think Rebecca demonstrates. Based on her history, it can be readily observed that Rebecca has achieved the final stage of Piaget’s stages of cognitive development, otherwise known as the Formal Operational Stage. She has demonstrated the capacity for abstract, systematic, and scientific thinking, by demonstrating hypothetico-deductive Reasoning, and propositional thought, the only two requirements of attaining Piaget’s last stage.Hypothetico-Deductive Reasoning: Rebecca has demonstrated her ability to take into account several abstract variables in her reasoning by virtue of the complex nature of conclusions she has made on her own in the past. For instance, her evaluation of her parent’s parenting-style was that, â€Å"we are as supportive and approving of her as the average parent, (†¦ ) but stricter than other parents. † The veracity of such a conclusion aside, â€Å"and despite our lack of knowledge as to the specific variables she used to make such an evaluation,† t can be readily observ ed that the pro-con nature of her evaluation was the result of a consideration of several factors, as well as their relationship to one another. Propositional Thought: Despite having an initial lack of confidence in math and language arts at the age of 12, â€Å"proficiency in which becomes increasingly tied to propositional reasoning skills,† a lack of confidence does not equate a lack of competence.Her above average scores on her grade reports in middle school, and in her outstanding performance in English in her first year of high school would most likely indicate her ability to use abstract symbols to represent both concepts and real world objects, â€Å"its almost certain that she’s taking a high school algebra or higher based on her past academic performance level. † According to Kohlberg’s stages of moral development, Rebecca is solidly in the 3rd stage, morality of interpersonal cooperation.This conclusion is based solely on her expressed opinion of the shoplifting incident that occurred during her first year of high school, when several students on a team field-trip were caught stealing. She agreed with the punishment because, â€Å"they did not live up to the expectations of their parents, their coach, or their teammates. † Such reasoning indicates her belief that rules must be followed out of ideal-reciprocity, which in turn demonstrates the intent to maintain good relationships with friends, family, teachers, and others with whom she has some level of a personal tie to. ) Describe Erikson’s stage of Identity versus Role Confusion and how you think this applies to Rebecca’s current emotional state. Erikson’s conflict theory, specifically the Identity versus Role Confusion stage, states that upon reaching adolescence young people have an identity crisis, the successful resolution of which is determined by the successful resolution of earlier conflicts and/or â€Å"if society limits their choice s to ones that do not match their abilities and desires. † In his view, negative resolution of this stage resulted in individuals who, â€Å"(†¦ appear shallow, directionless, and unprepared for the challenges of adulthood. † Without going too far into Rebecca’s past, the stage preceding Identity v. Role Confusion known as Industry v. Inferiority, â€Å"6-11 years,† appears to have been properly resolved. Although occasionally displaying a lack of confidence in her abilities prior to completion of an activity, school or otherwise, she has almost always performed at a level above her peers, and received no shortage of praise or support from her parents concerning such activities.However the second condition of becoming â€Å"role confused† is a bit trickier. While we have supported her in all her positive undertakings, we have also recommended many choices to her. Though that might not be blatantly telling her she can’t do an activity or pursue an interest that is prosocial in nature, the fact that we were so actively involved in not only maintaining good behavior, but actively steering her life might have ultimately resulted in feeling trapped in an identity that wasn’t hers.Whether she likes an activity or not, the fact that so much of what she has undertaken in her life was initially recommended to her by us could have had an adverse effect on her sense of self in this time of natural psychological distancing from one’s parents. Supporting the claim of a possible state of role confusion being linked to her parents; during the summer of her 12th year, â€Å"the beginning of Identity v. Role Confusion,† Rebecca had a tendency to initially reject most of her parent’s suggestions for activities, but would eventually, â€Å"start in on some of them later as if it was her own idea. Again, it wasn’t the activity itself that she was rejecting so much as it was the fact that it was her parents recommending it. Perhaps this method of creating a sense of identity independent of her parents has only grown with age, and ultimately devolved into a complete rebellion against the practices and values instilled by her parents. She has come to associate her excellent school performance, following of the rules, and other practices as part of an identity that is fundamentally not her own by virtue of feeling as if she was given no choice, rather than if she herself was content with living such a lifestyle. ) In retrospect, can you see any patterns in her developmental history that might have been precursors to her current difficulties? As stated above, her current emotional state is primarily a combination of her unique growth during adolescence and the relationship between her parents/peers to her identity. That being said, her tempermant leading up to adolescence seems to be consistent with her behavior during the majority of adolescence.Rebecca was not a difficult child, but she did have issues getting comfortable with new surroundings and people, and detaching herself from her parents. Keeping environmental factors in mind, the possibility remains that that Rebecca’s difficulties with adjustment, identity, and emotional regulation, have a more genetic basis than is understood. This view is ultimately conjectural as even today our understanding of the relationship between genetics and behavior, â€Å"let alone personality types,† is far from advanced enough to support claims to a determining relationship between the two. ) As Rebecca’s parents, how do you think you should respond to these changes in her behavior? First off she would need to be punished for the possession of Marijuana and Cigarettes. She would be grounded and prevented from visiting anyone, â€Å"bad influence kids included,† for a month to give her some time to dry out. However, it would be important that we, her parents, explained to her the dangers of a busing such substances, â€Å"particularly marijuana,† at her age, while her brain is still developing.I believe that Rebecca needs to talk out her issues with another individual who shares our values, but is more experienced in dealing with teenage issues, I. E. a psychologist who specializes in talk-therapy. She needs both a better means of coping with life stressors, as well as positive reinforcement towards developing an identity that is in line with her pre-rebellious behavior yet giving her the perception that such constructive behaviors, though influenced by us, are in fact part of her own identity.After her punishment, it would be important for us to be less â€Å"hands on† in making life choices for her, â€Å"choosing sports, clubs, activities, etc.. † but to still praise her for her success. Rebecca needs space, but it remains a necessity to respond to detrimental behavior, and punish her accordingly but still keeping in line with our authoritarian pa renting style.

Friday, September 27, 2019

Reflect upon your own coaching practise (coaching sessions you have Essay

Reflect upon your own coaching practise (coaching sessions you have delivered) and critically explore the range of models and techniques used. (3000 words) - Essay Example The major type of coaching is educational coaching which offers an opportunity for learning as well as mentorship consequently improving academic or learning skills hence academic performance. Coaching is a one on one leaning mode that has been in existence for a long period but much focus has been put on this learning method especially in the recent past. This paper is a reflection of the importance of coaching, the different micro coaching models, and coaching strategies especially those I applied in my micro coaching sessions, and an analysis of why some worked perfectly while others proved to be problematic. During my micro coaching sessions, I realized how I would enjoy some coaching techniques and strategies while others were a blunder and made me feel like quitting or terminating my sessions. Coaching takes different spans of time with micro coaching taking a short period but producing excellent results if done properly. During my micro coaching sessions, I realized strategies like the five whys’ strategy was so pressurizing while others like the Grow model proved supportive and pleasing. I will endeavour to analyse reasons why some were not accommodating and how one can improve to generate better results than I managed. The sessions also helped me realise the importance of the coach understanding the needs of the coachee, their behaviours and attitude to decide on the appropriate coaching strategy. Before discussing the coaching techniques and strategies, it is important I first discuss why I found it important to engage in the micro coaching sessions. The major importance of enrolling in micro coaching was to get challenged which enabled me to focus and realize my potential. The coaching process amplified my desire to learn and i have surely improved on my review and learning skills. Coaching also helped me to improve my self-esteem since the coach motivated me to improve on my performance and when I saw an improvement in my results my

Thursday, September 26, 2019

Diversity in the work place (USA) managers challanges Research Paper

Diversity in the work place (USA) managers challanges - Research Paper Example Legislations and new technologies have made it possible for those with disabilities to join the workforce as it has become unlawful to deny a qualified person job opportunity due to physical disability (Nelson and Quick, 2012). Globalization in business transactions has also resulted in a diversified workforce as business organizations continue to discover new markets leading to opening of branches abroad therefore bringing together people from diverse national origins to work in teams for the organization (Cullen and Parboteeah, 2013). I recently visited a bank to open an account and did not fail to notice the racial, gender, and cultural diversity of the employees. On reading the banks brochure I discovered since it was an international banking agency, employees could be rotated all over the world. The U. S society is also a factor in workplace diversity where Nelson and Quick (2012) note that by about 2020, the country’s minority population will make up over one-half of new employees who join the U.S. workforce. This the authors point out is as a result of the improved participation rates of African Americans and Hispanic Americans in the labor force. Further, the authors see white non-Hispanics in the workforce making up 68 percent by the year 2020, 14 percent Hispanic, 11 percent African Americans and 5 percent Asian. The authors note this is an improved percentage that will see the workplace being more diversified (Nelson and Quick, 2012). Diversity in the culture of employees might pose a big challenge to managers who want to work with such a team. One of the major challenges for a diversified workforce is based on the difficulties in communication. People from diverse cultures have different ways of encoding and decoding messages whether verbal or nonverbal. Such cultural-based interpretation of communicated messages may lead to misunderstanding among employees leading to poor workplace relations due to misinterpretation of each other’s in tentions (Reece, 2013). Workplace diversity runs the risk of causing disorganization in the work place. People from the same background tend to form their own subgroups since they present the same ideas and viewpoints. This poses a challenge to the management, as they cannot rally all the employees to take a common stand through consensus building. Due to the disorganization in the workplace, the organization suffers as production is lowered when all employees and management cannot come together to champion a common course. Diversity in the workplace comes with stereotypes on how different groups of people work in the organization. Stereotyping increases stress and anxiety as the worker faced with such a challenge feels discriminated upon leading to low output levels (Nelson and Quick, 2012). The problem for mangers is coming up with strategic measure that will ensure effective management of people through creation of an organizational environment that attracts and retains diverse w orkforce by responding to changes in the demographic and social patterns

Group Roles as Evidenced in Mean Girls Movie Review

Group Roles as Evidenced in Mean Girls - Movie Review Example You have probably worked in groups that are effective and groups that are less or not effective. While there is no magic elixir upon knowing what moves groups forward and what limits their progress can be helpful whenever you are working in a group or team. In order for the group members of the team to have a harmonious relationship with each other they need to determine the strength and weakness of one other. To ascertain the strengths and weaknesses of each member of the group they need to identify the characters or roles of each member of the group. This will enable the group to help themselves adjust and cope with the each other and this will hasten to achieve the groups' desired goals harmoniously. There are certain and specific roles under a certain category that each member possesses during a group communication. Two theorists on group behavior were Kenneth Benne and Paul Sheats, who wrote an influential article titled "Functional Roles of Group Members" back in the 1940s. In it, they defined 26 different group roles that can be played by one or more people within a group. Their work influenced other early research and thinking on group functions. And whilst more recent research has refined many of these ideas. Benne and Sheats defined three categories of group roles: task roles, personal/social roles, and dysfunctional or individualistic roles. One of the films that portray a good representation of a group role ... Cady Heron's role in that group is the opinion giver because she expresses her own opinions and beliefs on a certain matter that her friends were initializing. Often states opinions in terms of what the group should do and should not do. This is because she grew up in a place where her parents taught her moral values. She is also the encourager she affirms supports and praises the efforts of fellow group members. Demonstrates warmth and provides a positive attitude towards her friends. In one of the films best lines after a telling off from Regina, Cady tries to comfort Karen wherein she told Karen that she is not stupid. She is also the harmonizer of the group she conciliates differences between individuals. Seeks ways to reduce tension and diffuse a situation. She is also an observer because she provides feedback to the group about how it is functioning. Another powerful character in that movie is Regina George. Although the high school students seemed to both adore and loath Regina George, her powerful position within the social organization at the school had many visible effects on her followers' behavior. Classmates copied Regina's style and vocabulary, and passed along Regina's gossip with vigor. In fact, the behavior of her closest friends was regulated by specific rules governing what to wear, who to date, and who to befriend. Their proximity to power was intoxicating despite Regina's mistreatment-so much so that when Gretchen was demoted to a lower position in the social hierarchy, "she knew it was better to be in the Plastics-hating life-than to not be in at all." Regina is the aggressor of the group she makes personal attacks using belittling and insulting comments, for example, "That's the most

Wednesday, September 25, 2019

West Indian Literature Essay Example | Topics and Well Written Essays - 3500 words

West Indian Literature - Essay Example Different authors have presented their own interpretations and preferences for what shape the Caribbean identity should take, but amongst the more prominent Caribbean authors there are those who want the improvement of the self for the uplift of the institutions and those who have a more historically oriented view. Both Derek Walcott and Wilson Harris have a desire for broader integration and fulfilment, but although Derek Walcott wants those from the Caribbean to boldly cease looking to their past in order to embrace the future, Wilson Harris appears to be somewhat fearful. This essay presents an examination of the debates about the Caribbean identity that are apparent in Caribbean literature and the evolution of Caribbean literary aesthetics by examining selected works of Derek Walcott and Wilson Harris. Caribbean literature has existed for centuries, but within the relatively recent past it has increased its worldwide acclaim and its mass of production. Both Derek Walcott and V. S. Naipaul were awarded the Nobel Prize in literature for their efforts which can be appreciated by anyone who has an interest in literature. Whereas Naipaul examines his Asian aspect of the Caribbean identity, Walcott presents a far more complex heritage and language in his poetry that presents the varied nuances of the Caribbean (Cudjoe, paragraph 23). Other writers have also made their contributions to the depiction of Caribbean aesthetics and culture by trying to define an identifiable cultural matrix within their works and some of the more prominent names that come to mind include Kamau Braithwaite, Erna Brodber, Wilson Harris and Olive Senior. Aesthetics refers to the branch of philosophy that deals with beauty and taste (Merriam-Webster, â€Å"aesthetics†). Thus, Caribbean aesthetics refers to that which is considered as being beautiful and worthy of distinction in the Caribbean region, especially

Tuesday, September 24, 2019

Baroque period Essay Example | Topics and Well Written Essays - 1250 words

Baroque period - Essay Example The purpose of this paper is to analyze one artwork of the Baroque Period, namely, the Judgment of Paris by Jacob Jordaens. This painting uses the medium of oil on canvas. It portrays a scene from Greek and Roman mythology where Zeus selected Paris to judge the most beautiful goddess among Athena, Aphrodite and Hera. Jordaens has portrayed Paris choosing Aphrodite as the most beautiful goddess in this painting. This painting was created by Jordaens between 1620 and1625. In order to properly analyze the painting, this painting will be compared with other paintings created in the same era by different artists. The painting of ‘Judgment by Paris’ painted by Jordaens is quite characteristic of the Baroque art period. It takes inspiration from many of the artworks created during that time period and has the same elements of drama, tension and opulence. In terms of the composition, the painting depicts the three nude goddesses in the foreground along with Paris. While there are other figures in the background, Jordaens manages to cast them in the background. He skillfully does this by covering these figures in clothes so that they do not attract the eye in the first instance. He also blurs some of these figures by painting them roughly. Another technique used by Jordaens to create a distinction between the figures in the background and foreground is by casting the figures in the foreground in bright light while those in the background have little light cast upon them. The three goddesses in this way are the most prominently displayed figures as their bodies glow the most and they are shown with curvy bodies. This technique of light and dark in the painting is quite characteristic of Baroque art. This can be observed in many such paintings of the same era such as ‘Midas and Bacchus’ by Nicolas Poussin. Poussin also uses the same technique to bring his main

Monday, September 23, 2019

Coaching High School Baseball Term Paper Example | Topics and Well Written Essays - 1500 words

Coaching High School Baseball - Term Paper Example During tryouts the coach has to decide on the combination of players; how many specialist pitchers he wants, how many players need to be groomed for the future and so on. If there are too many players then playing time would be split among them; if there are too few then there’s a risk of not having enough players for a game. Players have academics, vacations and other activities that take up their time so it is advisable to pick around fifteen to seventeen players. The number of players that can be picked is also dependent on the school or league rules. While picking the team during tryouts, the coach can make fact-based decisions by using a team selection matrix. The matrix consists of 3 to 5 selection criteria with weights assigned according to their importance. Different selection criteria can be chosen but the three most important are; player skills and positions, attitude and reception to coaching and athleticism and potential. Each player’s score is then multiplied by the weight for that criterion. The scores after weighting are added together to come up with the final tally used to choose the team. (Krause) After the team has been chosen, the next step is to acquire the equipment and uniforms. The overall look of the team can be helpful in providing confidence to the players. As budgets are usually tight, the cost of the uniforms is an important consideration. It should be remembered that the full cost will be a combination of the initial price and the added expense of uniform repairs and maintenance, thus quality and cost should be compared before making a decision. The athletes are the school’s representatives so the uniforms should be in the school colors and have the school logo displayed. The manufacturer should be able to design the uniforms with the athlete in mind. High school teams need uniforms that will support their growing bodies and their athleticism. The main component of a great high school baseball uniform is durability.

Sunday, September 22, 2019

Foundation Certification †My Short Notes Essay Example for Free

Foundation Certification – My Short Notes Essay A team or group of people and the tools they use to carry out one or more processes or activities. Functions provide units of organization responsible for specific outcomes. Functions are logically isolated from each other. Definition – Process A set of coordinated activities combining and implementing resources and capabilities in order to produce an outcome and provide value to customers or stakeholders. Process has following attributes. Trigger, Activity, Dependency Sequence Process should be measurable Process should produce specific output Process should meet customer expectation Definition – Process Owner The person/role responsible for ensuring that the process is fit for the desired purpose and is accountable for the outputs of that process. Definition – Service Owner The person/role accountable for the delivery of a specific IT Service. They are responsible for continual improvement and management of change affecting services under their care. The service owner is a primary stakeholder in all of the underlying IT processes that enable or support the service they own. Definition – Service A means of delivering value to customers by facilitating outcomes customers want to achieve without the ownership of specific costs or risks. Definition – RACI Model R – Responsibility (at least 1R per activity who is doing the actual work) A – Accountability (1 A per activity) C – Consult I – Inform Service Strategy The purpose is to define the perspective, position, plans, and patterns that a service provider needs to be able to execute to meet an organization’s business outcomes * Perspective – Defines the organization’s view of itself, generally communicated through the organization’s vision and direction. * Positions – Defines the distinctiveness of the organization in comparison to its competitive market and as identified through the minds of its customers. * Plans – The predefined details for supporting and enhancing the organization’s perspective and positions, usually identifying a potential future state for the organization and a strategic response to the state and level of investment required. * Patterns – Defines the conditions and actions that must be consistently in place and repeatable to achieve the objectives of the organization; patterns allow the organization to predict the future. Service strategy defines the role of serv ices and service provider in achieving the business objectives of the organization through management of IT. Value to Customer To enable a service provider to create value for a customer, a systematic approach has to be adopted. For ITIL, this approach is determining service utility and service warranty. Service Warranty (Fit for use) + Service Utility (Fit for propose) = Service Value Service utility and service warranty are present for every service provided to a customer. One cannot exist without the other. By describing both Service Utility and Service Warranty, it enables the provider to clearly establish the value of the service, differentiate themselves from the competition, and, when necessary, attach a meaningful price tag that has relevance to the customer and associated market space. Service Package = Enabling Services + Core Services + Enhancing Services Definition – Service Asset A Service Asset is any resource or capability used in the provision of services Definition – Business Case The business case is a detailed analysis of the benefits and impact of the business action in meeting the business objective and disrupting the delivery of other IT services. Attributes Introduction, Methods Assumptions, Business Impact, Risk Service Strategy Processes Demand Management Strategy Management for IT Services are out of scope for ITIL Foundation exam. 1. Financial Management * Responsible for securing the necessary fund to provide the service to the customer. * Maintain balance between cost of service and quality of the service * Maintain balance between supply and demand * Activities * Budgeting * IT Accounting * Chargeback * Service Valuation * Outputs * Service Valuation * Service Investment Analysis * Compliance (Align with rules regulations) * Cost optimization * Support for BIA 2. Service Portfolio Management * Track services throughout whole service lifecycle * Link services to their business objectives/value * Ensure all other management processes are working to get expected business outcomes * Includes Service Pipeline, Service Catalog Retired Service Catalog * Content : Description, Requirements/Business Cases, Value, Options, Price, Risk, Priority Investment Categories and Budget Allocations Phases/Activities of service portfolio management 3. Business Relationship Management * Maintain relationship between customer and service provider and understand customer needs * Ensure high level of customer satisfaction * Understand service packages and service level packages Service Design Benefits of Service Design * Reduction in total cost of ownership (TCO) * Improved quality of service * Improved consistency of service * Easier implementation of new or changed services * Improved service alignment * Improved service performance * Improved IT governance * Improved effectiveness of service management and IT processes * Improved information and decision-making * Improved alignment with customer values and strategies The Four Perspectives (Attributes) of ITSM * Partners/Suppliers * People * Product/Technology * Processes Major Aspects of Service Design * Service solutions for new or changed services * The management information systems and tools, especially the service portfolio * The technology architectures and management architectures * The processes required * The measurement methods and metrics Service Design Package (SDP) The contents of the service design package comprise four major sections with several smaller, but equally important, sub-sections. The four major sections are: †¢ Requirements †¢ Service Design †¢ Organizational readiness assessment †¢ Service Lifecycle Plan Service Design Processes 1. Design Coordination * Single point of coordination and control for all activities processes in Service Design stage * Individual organizations decide whether they need Design Coordination process or not. Only major changes will require this process * Activities 2. Service Level Management * Focus on Service Warranty (performance, availability, and security) * The establishment, monitoring, and improvements in service levels and their achievement * Communication to Customers Business managers on Service Levels. Will not conflict with Business Relationship Management process since this will only focus on Service Warranty * Manage, Negotiate Document SLR SLA * Develop Review OLA * Review UC for ensure they are align with SLA * Influence improvement within SIP * Monitor service performance against SLA * Three types of SLA structures. Service Based, Customer Based Multi Level/Hierarchical (Corporate, Customer Service based agreements) 3. Supplier Management * UC (Underpinning Contracts) SCMIS (Suppliers Contracts Management Information System) * Activities * Definition of new supplier and contract requirements * Evaluation of new suppliers and contracts * Supplier and contract categorization and maintenance of the * SCMIS * Establishment of new suppliers and contracts * Supplier, contract, and performance management * Contract renewal or termination * Supplier Categorization * Supplier Management process activities are span across all states except Service Strategy 4. Service Catalog Management * Include live service are services available for deployment (Customer-facing service and supportive services) * Service Catalog is a large part of the Service Portfolio. However, while the portfolio is focused on tracking the business requirements and the investments on a service, the Service Catalog is focused on the service solution and its delivery to the business * Service Catalog includes Business Service Catalog Technical Service Catalog * Top – Down approach is used when defining service catalog. (Business - Technical) 5. Capacity Management * Maintain balance between Resources/Capabilities Vs Demand * Business Capacity Management Service Capacity Management * Sub-Process of capacity management * Business * Service * Components * Activities * Performance Monitoring * Demand Management – Short term reactive activity * Application Sizing – New or Changed service * Modeling – Predict future behaviors * Tuning * Capacity Planning * Capacity Management Information System 6. Availability Management * Ensure that the level of availability delivered to all IT services matches the agreed need for availability or defined service level targets * Includes Reactive Activities (Monitoring, Incidents) Proactive Activities (Planning, Design) * Measurements * Mean Time Between Failures (MTBF) or Uptime * Mean Time to Restore Service (MTRS) or Downtime * Mean Time Between System Incidents (MTBSI) 7. IT Service Continuity Management * Known as disaster recover planning * Produce and maintain IT Service Continuity plan to support Business Continuity Plan * Business Impact Analysis (Quantify the loss) Risk Assessment (Identify possible failure points) are considered when implementing strategy * Ongoing activities to make people aware about the recovery plan. Trainings, Reviews 8. Information Security Management * Information security is a critical part of the warranty of a service * Ensuring that the agreed business needs regarding the confidentiality, integrity, and availability of the organization’s assets information, data, and IT services are matched * Develop and maintain information security policy align with business security requirements * Security test schedules and plans. * Information Security Management Perspectives * Organizational * Procedural * Physical * Technical * Framework for Managing Information Security * Plan * Implement * Control * Evaluate * Maintain Service Transition Service Transition Processes 1. Transition Planning and Support * Ensure proper attention is given to the overall planning for service transitions and to coordinate the resources required to implement the new or changed service * Provide clear and comprehensive plans that enable customer and business change projects to align their activities with the service transition plans * The scope of transition planning and support concentrates on the resources, schedules, and budgets required to move the IT service * To standardize methods and procedures used for efficient and prompt handling of all changes * A transition strategy will be constructed to define how all transitions will be managed within the organization based on the type and size of transitions expected in the environment 2. Knowledge Management * Maintain a Service Knowledge Management System (SKMS) that provides controlled access to knowledge, information, and data that is appropriate for each audience * DIKW Data-Information-Knowledge-Wisdom structure * Database to capture Data, Information and Knowledge but not Wisdom * Components of SKMS 3. Service Asset and Configuration Management * Ensure that assets under the control of the IT organization are identified, controlled, and properly cared for throughout their lifecycle * Identify, control, record, report, audit, and verify services and other configuration items (CIs), including versions, baselines, constituent components, their attributes, and relationships * Manage complete life cycle of CI * Activities * Planning – Strategy, Policy, Objectives, CMDB Design * Identification – What CI to be recorded their relationships * Control * Status Accounting * Verification Audit 4. Change Management * Ensure that all changes to configuration items are recorded in the configuration management system * Optimize overall business risk. It is often correct to minimize business risk, but sometimes it is appropriate to knowingly accept a risk because of the potential benefit. * Types of changes * Normal Changes – Need to go through all steps of change management process * Standard Changes – Pre approved changes. Should be possible via service request. No need of RFC * Emergency Change * Steps * The RFC is logged. * An initial review is performed (to filter RFCs). * The RFCs are assessed and may require involvement of CAB or ECAB. * Authorization of change builds and test by the Change Manager * Coordination of the build and test, e.g., work orders are issued for the * Build of the change (carried out by other groups) * Change Management authorizes deployment. * Change Management coordinates the deployment (with multiple checkpoints). * The change is reviewed (Post Implementation Review). * The change is closed. 5. Release and Deployment Management * Planning, scheduling, and controlling practices applied to the build, test, and deployment of releases * Define and agree Release and Deployment Management plans with customers and stakeholders * Four phases of release deployment management * Release Deployment Planning * Release Build Test * Deployment * Review Close Service Operation Responsible for the ongoing management of the technology that is used to deliver and support the services. Service Operation accepts the new, modified, retiring, or retired services from Service Transition, once the test and acceptance criteria have been met. Functions Unique to Service Operations is the introduction of functions. While a defined function does have responsibilities in all stages of the Service Lifecycle, the majority of activities they performed are completed within the scope of Service operations. 1. Service Desk * Single point of contact between the services being provided and the users. A typical Service Desk will manage incidents and service requests as well as communication with the users. Thus, the Service Desk staff will execute the Incident Management and Request Fulfillment processes with the intent to restore normal-state service operation to users as quickly as possible * Minimize service outage day to day basis * Make sure that agreed services only provide to those who authorized * Structures * Local * Central * Virtual * Follow the Sun * Activities * Logging all request, prioritization, categorization and first level of investigation * Keep user informed about incident outage * Customer satisfaction survey 2. Technical Management * Custodian of technical knowledge and expertise related to managing the IT Infrastructure. It provides detailed technical skills and resources needed to support the ongoing operation of the IT Infrastructure. * Plays an important role in providing the actual resources to support the IT Service Management lifecycle. It ensures that resources are effectively trained and deployed to design, build, and transition, operate, and improve the technology to deliver and support IT Services. 3. IT Operations Management * Ongoing management and maintenance of an organization’s IT infrastructure. IT operations is the set of activities used in the day-to-day running of the IT infrastructure to deliver IT services at agreed levels to meet stated business objectives.IT Operation Control * IT Operation Control * Job Scheduling, Backup, Restore and Monitoring * Facilities Management * Data Centers, Recovery Sites, Computer Rooms 4. Application Management * Application Management covers the entire ongoing lifecycle of an application, including requirements, design, build, deploy, operate, and optimize. Service Operation Processes 1. Event Management * Detecting Event, Understanding Event, Determining Appropriate Control Action * Three Types of events * Informational * Warning * Exception * Populate SKMS with event information and history 2. Incident Management * An unplanned interruption to an IT service or reduction in the quality of an IT service, or a failure of a CI that has not yet impacted an IT service * The purpose of Incident Management is not to prevent an incident, but to reduce its impact by restoring normal service operation as quickly as possible * Ensure that standardized methods and procedures are used for efficient and prompt response, analysis, documentation, ongoing management, and reporting of incidents * Incident Models Steps and procedures that should be used to manage previously seen and documented incidents * Steps * Order of Steps * Responsibilities – Who should do what * Time scale/Threshold * Escalation Procedures * Any necessary evidence/prevention actions * Activities * Identification * Logging – All incidents regardless of source of that incident * Categorization * Prioritization * Impact + Urgency = Priority * Initial Diagnosis * Escalation * Functional * Hierarchical * Investigation and Diagnosis * Resolution * Closure 3. Problem Management * Concentrate on diagnosing the root cause of incidents and on determining the resolution to those problems. * Defines a problem as the underlying cause of one or more incidents 4. Request Fulfillment * Form of changes that are small in nature, low risk, and low cost in its execution, and are frequently performed * Activities * Menu Selection * Financial Approval Optional * Other Approval Optional * Fulfillment * Closure 5. Access Management * Effectively execute the policies in Information Security Management, enabling the organization to manage the confidentiality, availability, and integrity of the organization’s data and intellectual property. Continual Service Improvements * CSI is always seeking ways to improve service effectiveness, process effectiveness, and cost effectiveness * Review, analyze, prioritize, and make recommendations on improvement opportunities in each lifecycle stage * Periodically conducting internal audits verifying employee and process compliance * Periodically conducting customer satisfaction surveys * Continual Service Improvement Approach * CSI Register * Part of SKMS. And keep track of all improvements opportunities. * Anyone should be able to access and submit improvement points to CSI Register * IT Governance has three main areas * Enterprise, Corporate, IT Governance * Types of Metrics * Technology – Performance, Availability * Process – KPI, * Service * Tension Metrics : Resources, Features, Time Schedule The Deming Cycle * Plan: Design or revise business process components to improve results * Do: Implement the plan and measure its performance * Check: Assess the measurements and report the results to decision makers * Act: Decide on changes needed to improve the process Seven Steps Improvement Process 1. Identify Strategy for Improvements 2. Define What You Will Measure 3. Gather Data 4. Process Data 5. Analyze the information data 6. Present and use the information 7. Implement Improvement

Saturday, September 21, 2019

Standalone, Client-server, P2P Systems and Applications

Standalone, Client-server, P2P Systems and Applications Content Definition of Standalone, client-server, peer to peer systems and applications Comparison between standalone, client-server, peer to peer systems and applications Web service and mobile application describe Comparison of web service and mobile application Application types, internet banking Describe application types, system benchmark Online freeware and application types List of application types and Multiplayer game Introduction The overall aim of the initiative is how computer system like hardware and software work and some of the sectors such as standalone, client-server, p2p, websites, gaming, Mobile apps and also cover internet banking. In addition, compare different systems and application, In this, case study diagrams play crucial role to understand case study Task 1 A Standalone A standalone computer system comment on any desktop computer or laptop without needs a connection to local area network (LAN) or wide area network (WAN) that can run small applications on its own. In addition, all the application programs normally installed on the hard disk and its do not require any extra software apart from operation system to run. Windows, IOS, android, OS x and Linux are some examples of standalone systems. After that, standalone applications mainly elderly type software not installed on each customer computer system. Essence computing manufacture only platform-independent applications. After that, its user choice to use any operating system on their computer. (emblad, 2009) Client-Server Client- server system are not similar to old type computer. The main work of Client-server system is supply good resources and services to one or more clients at the same time. In other words, a single server can provide data to a large group at one time. An example, automated teller machine (ATM) network. The server that controls all of the bank accounts. Then, customers generally use ATMs as clients to interface to a server. When two banks servers connected with each other. Then, ATMs provide a user interface and the server gives services such as resettle money from account to account. Client- server application is that category of software that runs on client PCs and creates command to the remote server. This kind of application written in high-level visual programming (htt5) In this diagram, one server that connects to number of computers at one time       Peer to peer (p2p) Peer to peer networking is a technique of share individual resources(data) and it is effective for small-scale businesses or for home. In addition, theres no main server on the network thats why p2p network only shares files and printer as possible. For example, telephony traffic is also progress using p2p technology. Peer to peer applications comes in use when downloading files from numerous sources on the internet. Some examples, Bittorrent, Limewire, Gnutella, kazaa etc (information) In this picture, its shows connection of different PCs for data sharing   Ã‚   Task1 B Comparison of standalone, client-server, peer to peer systems and application Standalone Client-server Peer to peer In standalone system, most client-server application can be installed in standalone setup Standalone system offers no security They can also be portable applications -Standalone app works without the internet -A portable application does not require installation and can be brought to everywhere -There are separate dedicated servers client server system store files on the server client-server can become as big as you need them to be -It offers elaborate security measures -Become very expensive -Large number of workstations -Easy to manage It has no central server -P2p system no central storage or authentication -But not in p2p installed only in homes computers or very small businesses -They offer almost no security -Inexpensive to set up -Limited number of workstations -Hard to manage (http://www.techrepublic.com/article/understanding-the-differences-between-client-server-and-peer-to-peer-networks/ ) Task 2A Describe web service and mobile application 1) Web service Application service is a software that built and available over the internet and the main use of web services is XML messing system.In simple words. Web service is a self-contained, dynamic application, distributed that can be printed and discovered on the internet to generated outcomes and supply chains. For example, java apache Axis 2, microsoft.NET, Perl web and Python web. (htt) 2) Mobile applications Mobile application are manufactured for small handheld devices like tablets, mobile phones and smartphones. In addition, app store is the main hub of mobile apps in which all types of app are downloaded and some of them also preloaded in the devices. The android, IOS, Windows and blackberry are well- known smartphones platforms for supporting a mobile app. For examples, games, education, music, shopping, IM apps (priya, 2016) This show different types of mobile apps Comparison between web services and mobile apps Web service Web services are standard based, process for development and maintenance -It also reduce integration costs With the help of web services business to business, integration becomes easier Easy to installing and maintain Some issues are lack of access from brawer No links from emails and web pages -It does not hold position HTTP Mobile application -Mobile apps can be downloaded from an online store It always remains on the users smartphones, either for repeated or frequent use The maintenance cost is high High graphical performance Good Security system Fast apps performance Slow development speed and high development cost (https://www.apteligent.com/2015/09/app-insight-between-mobile-and-web/) Task 3 Application types, Internet Banking 1) Internet banking Internet banking are very popular and easy to use in the modern world and people with one touch takes the account detail through a smartphone without visit any branch of the bank. More than that, user can transfer and receive money, pay bills, initiate fixed deposits through banking app Types of testing in Internet banking applications 1) Usability testing- Its will very good things that banking application need to be tested for simple and good design so that ever user would be able to work with internet banking application 2) Functional testing Functional testing enclose to examine for all specifications and requirements 3) Performance testing- Mainly during festival time and when bank offer discounts on different product on that time performance failures can effects the reputation of the financial institution badly 4) Database testing- This will be done for data integrity, migration, validation and rules 5) UAT testing- banking application is use (htt2) In the case of internet banking, mobile application and web services are more usefull rather than p2p, standalone and client-server. Because now a days banking play a crucial role in business and its all happness with the help of internet. In addition, banking apps and websites are very important in client life Task 3 System Benchmark Is a type of test that checks the performance of hardware and software. This test also uses to compare two different products according to their performance. When comparing benchmark, the value of the product come higher in the result thats means faster the component, software and overall computer. This picture clear all things (htt3) Example of computer benchmark programs 1) Pass mark Mainly it is a software company thats making software for benchmark testing on a computer system 2) Cyrstal mark crystal mark is collection of freeware benchmark software In system benchmark In my opinion, the system benchmark is already installed in our computer windows so, there is not the role of mobile apps and web services but, p2p, standalone and client-server come in use because benchmark compares the performance of two different. In case, client-server and p2p may be used Online Freeware Online freeware means not an original copy of the software, application or program that freely download from the internet and then installed on Pc and used it. Such, a program is free of cost to users. There is the total difference between free software and freeware, as the user allows to modify the source code for integrated with other software. Common examples, Mozilla firebox, goggle chrome and PDF file and skype, also Freeware anti-virus software like AVG free anti- virus and Microsoft security Essentials. Mainly freeware comes in all category software Freeware software available for no cost money, mostly software comes with some restriction on the distribution and most copies maker and in which user can chance the program source code, some software are open source and left ones remains closed source (htt4) Online freeware totally comes in web services application because when client downloaded the software from website whenever it is copy write software. In that case, web services and mobile application come in use Multiplayer Games There is no end for multiplayer games, but, I cannot describe in the definition. Multiplayer game mainly plays on the internet and more than one player can play and most multiplayer games connected players through the multiplayer server. EA is one of largest video games manufactural company and EA deals with all category games like sports, action, puzzle, racing and some software In diagram, different number of players play the game by connected with the internet, so picture explain all about multiplayer games(https://www.rosiesworld.co.nz/games/?gclid=CLnduP3ItNICFYaVvAodV7IMXg) In my opinion, multiplayer games cannot run without both the applications, because client downloaded the game from the web site and then client-server makes the connection between different player. After that, players start playing game through the internet References (n.d.). guis/remotecliserver.html. (n.d.). https://www.tutorialspoint.com/webservices/what_are_web_services.htm. (n.d.). http://www.softwaretestingclass.com/internet-banking-application-sample-test-cases-and-best-practices/. (n.d.). http://www.softwaretestingclass.com/internet-banking-application-sample-test-cases-and-best-practices/. (n.d.). http://www.computerhope.com/jargon/b/benchmar.htm. (n.d.). https://www.reference.com/technology/examples-freeware-73ea36c07127304. (n.d.). https://techterms.com/definition/client-server_model. emblad, s. (2009). https://www.thebalance.com/types-of-stand-alone-software-1293731. information, g. (n.d.). https://daf.csulb.edu/offices/its/publication/p2p.html#q1. priya. (2016). https://www.lifewire.com/what-is-a-mobile-application-2373354?utm_term=mobile+applications+definitionutm_content=p1-main-2-titleutm_medium=sem. SUMMARY In case study reach, I discus different topics p2p, standalone, client-server and compare them. After that, give some examples and references. In addition, web services and mobiles apps and it uses, examples. In the second part, system benchmark, internet banking and games and give an introduction on application types and in last references. 1) Task1A Description of Standalone ,Client-server ,peer to peer Systems and applications Standalone A standalone device easily functions with other hardware. This means it is unable to combine with another device. For example, DVR that is integrated into a digital cable box is not a standalone While a TIVO box that can record television programs is a Standalone device Moreover, standalone can also know as Software programs that it runs only on operating system not require any types of software. This means that most software programs are a standalone program. Mainly, software like expansion packs for video games and Plug-ins are not standalone programs Since they will not runs unless a certain program is already installed Clientserver client-server systems are not similar to old type computer. The main work of client-server system provides resources and services to one and more clients. In other words, a single server can provide information to a number of clients at one time. An example, automated teller machine (ATM) network. The server that manages all of the accounts for bank and customers typically use ATMs as clients to interface to a server. This server may connect with another bank server (such as when withdrawing money at a bank at which the user does not have an account). The ATMs provide a user interface and the servers provide services Such as transferring money between accounts and cheeking on account