Saturday, August 31, 2019

The Problem of Thor Bridge

Other conventions are used in the text yet the previously sites will be discussed in this essay. All of these conventions are evident through Dole's literary features. These crime writing features ensure the text directly conforms to the great detective style of the genre. The text begins with, Watson the central character, detective Sherlock Holmes loyal assistant narrating the previous case they had tackled. This convention of Watson narration is demonstrated in the first line â€Å"there is a travel-worn and battered tin dispatch-box with my name, John H.Watson, M. D†. He then goes on to tell of the achieving of a letter from a clearly distressed male asking for help to protect his girlfriend, reflecting on the convention of a man in distress begging for help with a case. â€Å"l can't explain things-I can't even try to explain them, but I know beyond all doubt that Miss Dunbar is innocent. † The literary technique, first person perspective is used throughout the let ter to describe the situation so that it becomes apparent to the reader that a real man is pleading for help from the talented detective.The story continues as Holmes begins to use his incredible skills of observation to covers clues, when he notices a mark on Thro Bridge, this alone demonstrates the distinctive characteristics of the great detective. The description in the quote â€Å"The stonework was grey, but at this one point It showed white for a space not larger than a sixpence,† it draws attention to his superior surveillance talent. Nearing the conclusion of the story Holmes communicates his discoveries to those partaking In the Incident.This convention Is demonstrated In the final paragraph of the short story â€Å"Then she took one of her husband's revolvers-there was, as you saw, n arsenal In the house-and kept It for her own use. A similar one she concealed that morning In Miss Dunbar wardrobe after discharging one barrel, which she could easily do In the woods without attracting attention. She then went down to the bridge where she had contrived this exceedingly Ingenious method for getting rid of her weapon. When Miss Dunbar appeared she used her last breath In pouring out her hatred, and then, when she was out of hearing, carried out her terrible purpose.Every link Is now In Its place and the chain Is complete† Each convention used and discussed In this essay, demonstrate the style of crime writing written at the time. Closer analysis of salary texts from different periods also begin to show the evolution of the genre over time. The Problem of Thro Bridge By catty case. â€Å"l can't explain things-I can't even try to explain them, but I know beyond all stonework was grey, but at this one point it showed white for a space not larger than partaking in the incident. This convention is demonstrated in the final paragraph of an arsenal in the house-and kept it for her own use.A similar one she concealed that morning in Miss Dunbar wa rdrobe after discharging one barrel, which she could easily do in the woods without attracting attention. She then went down to the bridge where she had contrived this exceedingly ingenious method for getting rid of her weapon. When Miss Dunbar appeared she used her last breath in pouring out her Every link is now in its place and the chain is complete† Each convention used and discussed in this essay, demonstrate the style of crime writing written at the time. Closer analysis of similar texts from different periods also

Friday, August 30, 2019

Battle of Frediericksburg Analysis

The Battle of Fredericksburg David P. Wrighten, CPT, MS Class 09-002 Small Group 6, MAJ Sims 03 April 2009 Abstract In early December 1862, the Union Army of the Potomac had massed on the northern bank of the Rappahannock River as it was in position to strike the Confederate capital of Richmond, Virginia. The Union also position themselves to cut off the Confederate Army’s main supply route for the import and export of goods in the south. The Confederate Army of Northern Virginia confronted the Union Army’s attempted strike on the south side of the Rappahannock by occupying the high ground overlooking the riverside town of Fredericksburg. Caught between the two opposing armies, Fredericksburg was destined to the battleground for a bloody prelude of major battles between the Union and Confederate armies in the open fields of the south. The Battle of Fredericksburg Introduction The Battle of Fredericksburg occurred on 11 December 1862 on the banks of the Rappahannock River near the small town of Fredericksburg, Virginia. Pitting three divisions of the Union Forces commanded by MG Edwin V. Sumner, MG Joseph Hooker, and MG William B. Franklin, approximately 120,000 Soldiers against the two Confederate Forces Corps of Northern Virginia commanded by LTG James Longstreet and LTG Thomas L. Jackson approximately 90,000 Soldiers. This battle emphasized the effective use of Weather, Maneuver, Observation Fields of Fire, Cover, and concealment, Obstacles, Key Terrain, and Avenues of Approach. The use of the Battlefield Operating Systems was instrumental in the success of the mission. The primary source used to gather information was, Decisive Battles of the Civil War: the Battle of Fredericksburg by LT. COL. Joseph B. MitchellDrama on the Rappahannock: the Fredericksburg Campaign by Edward J. Stackpole. Secondary sources used were The Battle of Fredericksburg a Special Edition of: Civil War Times by Edward J. Stackpole and Guide to the Battles of Chancellorsville and Fredericksburg by Jay Luvaas and Harold W. Nelson. Strategic Setting Fredericksburg, Virginia during the 1860s had developed into a family oriented community. This town happened to be the farthest point to navigate up the Rappahannock River. It was a very important site for trading for imported and exported goods. However, the larger, newer sailing vessels had difficulties in navigating the Rappahannock, which greatly hinder the international trade with other less modern customers of trade. This allowed members of Fredericksburg to live a more normal or less congested big city lifestyle. Militarily, this river is important for resupplying Soldiers critical supplies in order to fight effectively. The town of Fredericksburg changed hands many times throughout the war. Being located so closely to Richmond and Washington, it can greatly assist or resist in a potential attack on Richmond or Washington. In addition, this town could act as a staging area prior to launching an attack on the nation’s capital. Furthermore, four major battles fought within a seventeen-mile radius of Fredericksburg, Virginia. The major encounter during the Battle of Fredericksburg took place in Virginia. MG Ambrose Burnside’s Federal Army of the Potomac tried to countermine Gen Robert E. Lee’s Army of Northern Virginia and capture Richmond. However, this would be a difficult task, since the Confederates were deeply entrenched into a defensive position west of town. Tactical Situation 1. Mission: Gen Burnside’s was to cross the Rappahannock River and seize the heights behind Fredericksburg, Virginia before Gen Lee’s army arrived. After seizing the town of Fredericksburg, the Army of the Potomac would then advance south to Richmond. In order to cross the Rappahannock Burnside had to build multiple bridges; for this purpose, support elements sent pontoon bridge equipment to Fredericksburg. The Union Forces arrived to the northern banks of the Rappahannock; there were no Confederate Forces in sight. It ould seem as if the advantage would be on the side of the Union Forces. 2. Equipment: Gen Hunt deployed riflemen to provide covering fire for the engineers at each end of the three construction points. He also possessed 147 artillery pieces to serve as the main deterrent to the Confederate Forces opposing the Union effort and accommodate a moderate logistics train. His ammo and other classes of supply were plentiful but the distance wou ld slowly cause these resources to erode. The Confederates had sufficient food and water, but other classes of supply were scarce, particularly their ammo. Many carried hunting rifles and shotguns of varying caliber. The Union Forces had a clear advantage. 3. Terrain: The city and its environs along the Rappahannock River in north-central Virginia were significant obstacles to Union advances on Richmond, the Confederate capital. The battlefield consists of a series of flood plains and river terraces with gentle slopes paralleled by north-south ridges that provide structural boundaries on either side, all comprised of Tertiary and Quaternary Coastal Plain sediments. The Confederates, led by Gen Robert E. Lee, effectively used natural terrain features to impede attacks made by the Union army. Tactical benefits also accrued by the Confederates from manufactured obstacles on the battlefield, e. g. , stone walls and fences. After crossing the Rappahannock River, the Union Army, had to attack uphill with little cover in their unsuccessful attempts to dislodge the Confederates. This gave the Confederate Forces the advantage against the Union strike. 4. Troops: Strategically the Union Forces had the advantage with the number of troops under Gen Burnsides command at nearly 120,000. The Confederate Forces had the advantage as having set up their defensive positions and direct access through their supply routes to their headquarters in Richmond, Virginia. The Confederate Forces did lack military training in the ranks as well as standard issue items that would help in the success of their campaign. The Union Forces had a clear advantage as far as personnel, but Confederate Forces had an advantage for their ability to resupply the units. 5. Time: This historic Fredericksburg Campaign planned and executed over a two-month period in November – December of 1862. This was during an extremely cold and harsh winter season. It reduced both the Union and Confederate forces from quiet movements, clear line of sight during pre-dawn hours (fog on the river), heavy snowfall, which restricted movements, thick terrain made of oak, maple, cedar, and highly thick entangled brush cause limited mobility, counter mobility and reduced eyes on the enemy. Therefore, even though the weather did not favor either side, it did not kept tactical goals of either side from being established. The Battle After, the Battle of Bull Run both armies devoted the second half of 1861 and part of 1862 to make serious adjustments for more important battles to come. Procurement of supplies, training, recruiting new soldiers, and other military activities was the primary training mission of both armies. Neither force was in any particular hurry to conduct an offensive operation. An impatient President waited in the White House to see how his popular commanding officer will retrain and utilize his powerful forces. Gen McClellan moved his forces in March 1862, via water, to the Virginia Peninsula between the York and James Rivers. The intent of this move was to take Richmond, Virginia. However, Johnston countered this plan by moving his Confederate soldiers overland in the same direction. Therefore, Gen Mc McClellan staged his troops at Fort Monroe. At the same time, Stonewall Jackson began his Shenandoah Valley Campaign, wounded in battle General Johnston was succeed by Robert E. Lee. On Oct. 6, the President instructed Gen McClellan to â€Å"cross the Potomac and give battle to the enemy, or drive him South. Your army must now move,† â€Å"he said, â€Å"while the roads are good. † Twenty-four days spent in correspondence before Gen McClellan obeyed the order of the president. Gen McClellan complained of a lack of men and supplies to make it prudent to move forward. At length, October had nearly passed by and Gen Lee’s army thoroughly rested and reorganized, and communications with Richmond re-established, the Army of the Potomac began to cross the river (Oct. 26), 100,000 strong. The Nationals led down the east side of the Blue Ridge, but failed to strike the retreating Confederates over the mountain in flank or to get ahead of them; and Gen Lee pushed Gen Longstreet’s troops over the Blue Ridge to Culpeper Courthouse, between the Army of the Potomac and Richmond, ready to dispute the advance of the Nationals. Quick and energetic movements were now necessary to sever and defeat, in detail, Gen Lee’s army. (See Map 1) On Nov. 75, the President relieved Gen McClellan of command, and Gen Burnside took command of the Corps. A sense of responsibility made the latter commander exceedingly cautious. Before he moved, he endeavored to get his 120,000 men well in hand. Gen Burnside determined Aquia Creek Landing as his resupply hub and main base for his assault. His overall decision was to, and he moved the army towards Fredericksburg down the Fredericksburg Route towards Fredericksburg. The allowed his forces to cover Washington and assure better protection of his lines of resupply and communication. Oon Nov. 150 Gen. Sumner led the movement from Warrenton down the left bank of the Rappahannock and covered almost 40 miles in two and one-half days to Falmouth. By November 21, Gen Longstreet's Corps had arrived near Fredericksburg, and Gen Jackson's (which had been downstream along the Rappahannock to prevent crossings there) was following rapidly. Gen Lee at first anticipated that he would fight Gen Burnside northwest of Fredericksburg and that it might be necessary to drop back behind the North Anna River. However, when he saw how slowly Gen Burnside was moving, he directed all of his army toward Fredericksburg. The first pontoon bridges arrived at Falmouth on November 25, much too late to enable the Army of the Potomac to cross the river without opposition. Gen Burnside still had an opportunity, however, because he was facing only half of Gen Lee's army, not yet dug in, and if he acted quickly, he might be able to attack Longstreet and defeat him before Jackson arrived. Once again, he squandered his opportunity. The bridges arrived at the end of the month, and by this time, Gen Jackson was present and Gen Longstreet was preparing strong defenses. Gen Burnside originally plannedplanned to use Gen McClellan’s original plan of to crossing his army east of Fredericksburg; 10 miles (16 km) downstream at Skinker's Neck, but Early's division arrived there and blocked him. Therefore,So he Gen Burnside decided to cross directly at Fredericksburg. On December 9, he wrote to Halleck, â€Å"I think now the enemy will be more surprised by a crossing immediately in our front than any other part of the river. †¦ I'm convinced that a large force of the enemy is now concentrated at Port Royal, its left resting on Fredericksburg, which we hope to turn. † In addition to, his numerical advantage in troop strength, Gen Burnside also had the advantage of knowing his army could not be attacked effectively. On the other side of the Rappahannock, 220 artillery pieces had been located on the ridge known as Stafford Heights to prevent Gen Lee's army from mounting any major counterattacks. (See Map 1) On the morning of December 11, Union Engineers began the construction of six pontoon bridges in preparation for the passage of Union Forces across the Rappahannock River. Two placed north of the Town Center, a third on the southern end of town, and three further south near the confluence of the Rappahannock and Deep Run. During the assembly of the pontoon bridges, Union Engineers came under punishing fire from the Confederate Forces primarily from the sharpshooters of the Mississippi Brigade commanded by Gen Barksdale. Gen Burnside. tThen ordered his Union artillery batteries then to shelled the city. The artillery fire lasted for an hour in terrific bombardment in hopes to drive the Confederate sharpshooters out of their positions. The bombardment failed to dampen the spirits of Barksdale’s sharpshooters, as soon as the artillery fire ceased the musketeers popped out of the holes and resumed firing. Thus, the first attempt to cross the river was a failure due to the Confederates’ fires on federal engineers constructing pontoon bridges on the river. Gen Burnsides’ staff immediately began mission analysis on another plan to cross the river. Gen Hunt suggested the only solution to cross the river are volunteers to cross by ferry rowing in pontoons to secure the opposite side of the river a lay suppressive fire on Confederate sharpshooters to cover the bridge layers. Because of a lack in confidence on his part, Gen BurnsideIf he was confident and swift in issuing was slow in issuing his tactical instructions,instructions; the Union Army of the Potomac may have caught the Confederates unready to defend their positions properly. In addition to the failure of the first attempt to cross, there wasAdditionally, a decrease in morale of the Union ForcesArmy of the Potomac and their senior commandeleadershipr due to the hesitation of Gen Burnsides decisionstheir overall commander on not just one critical occasion but several occasions. Other occasions of indecisiveness and lack of initiative in dealing with the blunder of getting the pontoons transferred from Washington also attributed to the decrease in morale of not only the Leadership leadership but also the Soldiers. Furthermore, the inability of Burnside to consider the advice advice, from Gen Halleck, was trying to give on where to cross the river showed the lack of communication from the field commander to Washington Headquarters. The Chief Engineer of the Army ordered his engineers in the following format (Stackpole, p122): (These were the actual orders that were issued) Engineers will place two pontoons bridges to be constructed at the site of old pontoon bridge, one of them to have approaches for artillery. One pontoon bridge at site of old canal-boat bridge; approaches for artillery. Additionally, we will place two pontoon bridges just below mouth of Deep Run, a mile below Fredericksburg one to have artillery approach. Major Spaulding to throw three uppe r ones: major Magruder to throw the next, and Lieutenant Cross the lowest one. Bridge equipage, now at White Oak Church, to move up and go into park near Phillip’s house by dark. At midnight trains to move down within 400 yards of river, and to move down and begin unloading a two in the morning. If enemy fire is kept down, bridges to be thrown as soon as are unloaded; if too hot, wait until artillery silences it† The battle opened south of the city at 8:30 a. m. on December 13, when Maj. Gen. William Franklin ordered two of the divisions from the Left Grand Division to maneuver themselves through an unseen gap in Gen Jackson's defenses on the right and head towards Hamilton’s Crossing. By 10 a. m. , a thick fog began to lift, and the initially sluggish movements picked up speed. Gen Meade's division of 4,500 men formed the main attack, in direct support of Gen Meade’sthese movements the divisions of Gen Doubleday and Gen Gibbon. The Virginia Horse Artillery under Major John Pelham stalled the attack, and an artillery duel between Pelham and the Union artillery batteries lasted for approximately an hour. MAJ Pelham started his artillery attack with only two cannons—a 12-pounder Napoleon smoothbore and a rifled Blakely—but continued with only one after counter-battery fire disabled one of the cannons. Gen Lee observed the action and commented about Pelham, age 24, â€Å"It is glorious to see such courage in one so young. † As Meade finally made traction, he ran into Brig. Gen. Maxcy Gregg's brigade, scattering it. Gen Gregg was shot and mortally wounded; he died two days later. To Gen Meade's right, Gen Gibbon's attack against the brigades of Brig. Gen. William Dorsey Pender and Edward L. Thomas made good progress, but Gen Meade and Gen Gibbon men became separated; by 1:30 p. m. , a heavy Confederate counterattack pushed them back to the beachhead of the Rappahannock. Because of the foggy conditions, Federal artillery could not provide much assistance because of the inability to discern between Union and Confederate Forces. Driven back and chased by the Confederate infantry, raised some concerns with Gen Burnside, his divisions may be trapped at the river. The Federal line strengthened with addition of Brig. Gen. Daniel E. Sickles and Brig. Gen. David B. Birney divisions, and Stonewall Jackson's counterattack grounded to a halt. The focus of action moved north to Marye Heights. The initial assaults west of Fredericksburg began at 11 a. . as French's divisiontwo divisions from Gen Couch’s Corps, Gen French’s division and Gen Hancock’s division, moved along the Plank Road, facing a steep-banked drainage ditch and a wide, open plain of 400 yards (370 m), dominated by Confederate infantry and artillery behind a sunken road and stone wall. Earlier, artillerist Edward Porter Alexander, â€Å"A chicken could not live on that field w hen we open on it,† had assured Gen Longstreet. The Union men attacking had to file d into columns over two small bridges across the drainage ditch, making them a massed target. Attempts to shift the attack farther to the right failed because of swampy ground. As in the south, Union artillery was prevented by fog from effectively silencing the Confederate guns as from Stafford Heights Union guns were unable to reach the Confederate positions. Gen Burnside had anticipated this attack on the right would be merely supportive of his main effort on the left, but Franklin had stalled and resisted entreaties to continue, so Gen Burnside shifted his emphasis. After French's division was repulsed with heavy losses, Gen Burnside sent in the divisions of Gen Hancock and Gen Howard, which met a similar fate. By this time, Gen Pickett's division and one of Gen Hood's brigades had marched north to reinforce Marye Heights. Gen Griffin's division renewed the attack at 3:30 p. m. , followed by Gen Humphrey's division at 4 p. m. At dusk, Gen Getty's division assaulted from the east and was repulsed. Gen Burnside sent six Union Divisions in, virtually one brigade at a time, for sixteen individual charges, all of which failed, costing them from 6,000 to 8,000 casualties. Watching the carnage from the center of his line, a position now known as Lee's Hill, Gen Lee quoted as saying, â€Å"It is well that war is so terrible, or we should grow too fond of it. The action on the heights also included the charge of the Irish Brigade, which lost 50% of its strength in the battle but advanced further up the heights than any other Union Brigade. Confederate losses at Marye Heights totaled around 1,200. The falling of darkness and the pleas of Gen Burnside's subordinates were enough to put an end to the a ttacks. Gen Longstreet later wrote, â€Å"The charges had been desperate and bloody, but utterly hopeless. † Thousands of Union soldiers spent the cold December night on the fields leading to the Heights, unable to move or assist the wounded because of Confederate fire. The armies remained in position throughout the day on December 14, when Gen Burnside briefly considered leading his old IX Corps in one final attack on Marye Heights, but with the suggestions of many of his officers, he reconsidered and abandoned his campaign sending his troops to northern bank of the Rappahannock River. That afternoon, Burnside asked Lee for a truce to attend to his wounded, which Lee graciously granted. The next day the Federal forces retreated across the river, and the campaign ended. SIGNIFICANCE 1. Short Term: The Battle at Fredericksburg clearly showed how disastrous the Union Army Tactics were; President Abraham Lincoln relieved Gen Burnside of command a month after this battle. 2. Long Term: This was a major victory for the Army of Northern Virginia and costly to the Army of the Potomac. Many believe that Gen Lee lost his best chances to destroy the Gen Burnside’s forces at Fredericksburg. Overall, the loss broke the morale of the Army of the Potomac and showed a weakness in the indecisiveness and lack of imagination in part of Gen Burnside. ANALYSIS Gen Burnside failed to achieve the tenant of Initiative and his overall objective of destroying the enemy forces securing the town of Fredericksburg because he violated the Principle of Security and the Battle Operating System of Intelligence. The bulk of his forces fought to cross the river and very few were concerned with providing suppressive fire for the unit crossing. Gen Lee’s forces upon making contact with what he believed to be the enemies fleeing main force at Devil’s Swamp, he committed himself to battle without pausing to use his cavalry to reconnoiter the country. Gen Lee used his CCavalry Troops conducted rereconnaissancecon'd to the east and west of the Rappahannock marshy lowlandsRiver;, an action that gave him an extreme advantage into witnessing the movement of Gen Burnside's forceswhich might have permitted him to cross unmolested at a point up or downstream from the swamp. Thus, outflanking Culpepper and forcing him to withdraw without an opportunity to spring his cleverly crafted trap. The use of the terrain also gave Gen Lee a clear advantage as the Rappahannock River and extended entrenchments gave Gen Burnside’s forces great difficulty. For his part, Brigadier CulpepperGen Lee effectively adhered to the Principles of Maneuver, Mass, and Economy of Force. Through the Tenant of Synchronization, these factors combined to create the culminating Principle of Surprise. Outnumbered and outgunned, he realized that he could not achieve his objective of ascertaining Morgan’s Gen Burnside’s force and denying it control of the rail and road junction, as well as Yearlingvilletown of Fredericksburg, by engaging in a conventional battle on anything approaching even terms he used unconventional tactics to achieve his goal. He possessed a clear understanding of what he had to accomplish and how he had to do so. He Gen Lee employed Maneuver and Mass of critical combat power at the decisive time and place while making effective use of both the weak and strong points of the units he led. By marring Morgan in the swampsstalling Burnside’s movement across the river, he placed his enemy in a position of disadvantage. He shifted the battle to one where he positioned his massed combat power into a fixed enemy whose only option was to sink and die discontinue its efforts of seizing the town of Fredericksburg and retreat to the north side of the Rappahannock River. Culpepper Gen Lee exercised effective Synchronization and Economy of Force, deftly controlling the movements and fires of the disparate elements of his force in accordance with the elements of an intelligently conceived and workable plan of action in order to bring about the desired combat power at the decisive point. His employment of his cavalry, guerrillas, and militia reflected a thorough thought process of utilizing each element in ana precisely orchestrated maneuver exact orchestration to achieve the desired effect of ousting the Army of the Potomac from the town of Fredericksburg back to the northern banks of the Rappahannock River. uring Morgan’s troops into the killing field of overwhelming force. His exploitation of Union Forces weaknesses in decisive movement and execution of a sound plan display Gen Lee’s his Seminole scouts’ superior knowledge of critical terrain features while denying the enemy the opportunity to effectively reconnoiter the same gro und gave the critical element of Surprise once the battle was opened in accordance with the time, place and circumstances of his own choosing. Stackpole, Edward J. Drama on the Rappahannock: The Fredericksburg Campaign. Mechanicsburg, Pennsylvania: Stackpole Books, 1991 P. 23 Stackpole, Edward J. Drama on the Rappahannock: The Fredericksburg Campaign. Mechanicsburg, Pennsylvania: Stackpole Books, 1991 P. 121 Stackpole, Edward J. Drama on the Rappahannock: The Fredericksburg Campaign. Mechanicsburg, Pennsylvania: Stackpole Books, 1991, P. 122 O'Reilly, Francis Augustin, The Fredericksburg Campaign: Winter War on the Rappahannock, Louisiana State University Press, 2003, P. 148 Goolrick, William K. and the Editors of Time-Life Books, Rebels Resurgent: Fredericksburg to Chancellorsville, Time-Life Books, 1985, P. 87 BIBLIOGRAPHY FM 3-0 Operations. Washington, D. C. : Headquarters Department of the Army, 2001. Goolrick, William K. Rebels Resurgent: Fredericksburg to Chancellorsville. Time-Life Books, 1985. Kennedy, Frances H. The Civil War Battlefield Guide. Boston: Houghton Mifflin Company, 1990. Luvaas, Jay and Nelson, Harold W. The U. S. Army War College Guides to the Battles of Chancellorsville & Fredericksburg. Lawrence: the University Press of Kansas, 1994. Mitchell, Joseph B. Decisive Battles of the Civil War. New York: G. P. Putnam’s Sons, 1955. O'Reilly, Francis Augustin. The Fredericksburg Campaign: Winter War on the Rappahannock. Louisiana State University Press, 2003. Palfrey, Francis W. The Army in the Civil War: The Antietam & Fredericksburg. New York: Charles Scribner's Sons, 1885. Parish, Peter J. The American Civil War. New York: Holmes & Meier Publishers, Inc, 1991. Stackpole, Edward J. Drama on the Rappahannock: The Fredericksburg Campaign. Mechanicsburg, Pennsylvannia: Stackpole Books, 1991.

Thursday, August 29, 2019

Computer Motherboard (Descriptive)

Computer Motherboard Motherboard acts like the arteries of a human taking the blood all over allowing the blood to travel. It has many line-like structures that are like the veins and the arteries. These lines are the wires mounted on the motherboard that keep thousandths or even millions of connection. Motherboard is a small yet powerful device inside the computer system. The motherboard has three cards on it. First, the graphics card, it is like the eyes of the computer, it acts like the eye that saw and reflects images to the screen.Second, the sound card it is the mouth of the computer, it sends sound to the speaker, it shouts what the computer says. And the third, the modem, the nose of the computer. It sniffs messages from the wires coming from the telephone lines. If there’s a blood, there’s also the heart. The processor of the computer acts as the heart of the computer. It has a square-shaped chip that has many pins. It sits on the motherboard controlling all th e cards including the motherboard.It controls, allows, and restricts information that is being disseminated into the system like the heart. It also has a heat sink and a fan keeping the processor cool. To be able to complete the system, it also has the brain. Hard disk serves as the brain of the computer. It is rectangular in shape. Inside it, there’s a mirror-like disk where all the information are stored. The disk spin at greater speed, depending on the information /data is being written into the disk.Motherboard is also consists of chips, transistors, and capacitors. It is the other component of the motherboard that acts like the organs of the system. These chips may be small as a grain of rice and bigger as a coin. Transistor is a small, black in color and rectangular in shape. It is sometimes recognizable because of its three metal legs attached on it. Transistors is consists of thousand or even million of IC (Integrated Circuit) packed in one part. And the capacitors ar e like tanks attached in the motherboard.It varies in size; it may be small, medium or large depending on the voltage and its capacitance. Motherboard is consists of millions of chips, transistors and IC’s. It acts like the body of the computer. Without it, the computer will not work. It is like the trunk of a tree. It is an amazing thing that has millions of wires attached in a small board. It is powerful and fundamental part that the computer will not work without it. Reference: * Motherboard. Retrieved from http://www. en. wikipedia. org/wiki/motherboard

I will explain it in the instructions Essay Example | Topics and Well Written Essays - 500 words - 3

I will explain it in the instructions - Essay Example Practically, socialism emerged as a consequence of theoretical, logical reasoning triggered by a moral crisis suspended by intellectual anarchy. A distinct feature before the Enlightenment era in Europe, aristocratic rule buoyed by the concentration of wealth [property] in the hands of the chosen few was inevitable, justifiable and God given. As a moderating mechanism, Christianity endorsed holy poverty as the clergy rented the air with the gospel of obligatory charity to the majority poor; a balance that leaned much on agriculture and whose effects could only get worse as the population expanded.2 Indeed as the impact of Industrial Revolution gradually changed the contours of European civilization, the old aristocracy was slowly rendered irrelevant as the bourgeoisie [the propertied] took effective economic and political control, drafting much of the peasant class into a chequered, industrial labor recruitments. The new modes of production granted the propertied a natural limitless accumulation of wealth, widening the inequality gap even further. The working class in the newly industrializing Europe suffered more than doubled with a stepped-up exploitation reaching the extremes; the old feudal system that guaranteed places of residence and limited income for peasants became no more; workers could be hired and fired at will; wage rates became driven by the market forces and could plummet as low as competition allowed; and factories operating 24/7 ran under the worst inhuman conditions ever witnessed in history. Adding to the misery of the proletariat, women and children became the preferred factories workers because of the cheaper pay.3 The result was a general decline in the standards of living and a subsequent attitudinal shift towards capitalism. Powered by the eighteenth century maxims of the French pioneers of thought, socialism was a change, inspiration movement dedicated

Wednesday, August 28, 2019

Energy Security in the Middle East Research Paper

Energy Security in the Middle East - Research Paper Example The research paper "Energy Security in the Middle East" discusses the energy security in the Middle East by focusing on various aspects such as energy security threats as well as global issues that are associated with energy security. Access to cheap energy has become significant in the functioning of modern economies. A significant vulnerability has emerged as a result of uneven distribution of energy supplies among various countries. Energy security is defined by international energy agency as the uninterrupted availability of energy sources at a reasonable price. There are various aspects that have been associated with energy security. They include both short–term and long term energy security. Short-term energy security tends to focus on the ability of the system of energy to respond promptly to immediate changes in the supply-demand balance whereas the long term energy security deals with the timely investment targeting energy supply and in line with environmental needs a nd economic developments. There seems to be a consensus on the issue of energy security achieving a certain significance since the energy shocks that was witnessed in the 1970s when present asymmetries between energy consumers and geographical distribution resources had been consolidated by most countries especially in the Middle East that depends on petroleum. Since then energy security has been incorporated into debates of the international relations theories. The existing international relations theories have demonstrated various approaches.

Tuesday, August 27, 2019

Ethical Cse Study Essay Example | Topics and Well Written Essays - 1000 words - 1

Ethical Cse Study - Essay Example Therefore it would be better for Jerry McCall to keep away from giving the patient any possible supply of Valium as it is a case of transgression on his part. It would not be any different if the medication requested is for the control of high blood pressure. The case remains the same more or less. This is because then again it is one form of medication that is required to be given by Jerry McCall or any other office assistant at Dr. Williams’ office (Hobkirk, 2011). Jerry McCall would in such a situation ask for advice from Dr. Williams because Dr. Williams would be the best person to seek suggestions from. The patient who is undergoing high blood pressure would then have to ask for assistance from Dr. Williams and would not rely on Jerry McCall’s help and assistance. Jerry McCall will not be protected from a lawsuit under the doctrine of respondent superior in case a patient has an adverse reaction whilst having a flight. Jerry McCall would have to face charges because he is the one who administered medication to the patient. This would also call for charges against Dr. Williams because it is his office that eventually gave the medication to the patient. Even though the medication was ill-advised and uncalled for, the role of Jerry McCall is all the more important (Weber, 2000). This is because he must not provide medication to individuals (patients) as he is unqualified for the post. Since he is an office assistant, he should only stick to what he has been hired for. The lawsuit would therefore be imposed on Jerry McCall and Dr. Williams for their negligence and in putting up with a situation that they could have avoided to begin with. My advice to Jerry McCall would be to make sure that he performs his job to the best of his abilities and not to interfere within the work domains of Dr. Williams. Through this mannerism, he will

Monday, August 26, 2019

International marketing Essay Example | Topics and Well Written Essays - 1000 words

International marketing - Essay Example Similarly, the increase in the competitiveness nature of international markets calls for improved quality and advancement in the production techniques (Ronkainen, 2005, p.97-8). The entry strategies in an international category involves making decisions on the goals and objectives of the firm, choice of the products/services, market penetration modes, and performance monitoring and control systems which are deemed appropriate for the market. After evaluating its potential, strengths, capacities, and limitations, a corporation then figures going multinational. Exploring an international market with more promising potential involves market screening of all the potential markets. The screening exercise is conducted based on economic, cultural, and political factors which have the potential of affecting operations of the firm in the foreign market (Keegan, & Schlegelmilch, 2011, p.37). Besides, geographical factors and demographic variables must be given close attention. These include lo cation, composition of the potential target consumers (based on gender, age, income, culture, and family structures), political and economic environment (covering from legal regulations, duties and taxes, to consumer protection standards), and market characteristics. Being the fundamental factors under investigation, size, level of competition, and distribution agents with the marketing environment must be valued (Root, 2009, p.56). Otherwise, if these factors are not considered, then the firm will not succeed in the foreign market as it will fail to command the much needed market share. The selection of an overseas market is conducted in five stages. The first stage entails conducting an investigation on the domestic market regulations and management preferences. The second stage involves conducting an initial entry assessment programs. The third and the fourth steps are conducting a survey on the competitiveness and market responses respectively. The final step in exploring foreig n market entails a detailed analysis of international trade-off possibilities (Wolfgang, 2008, p.67). After the completion of market selection, a firm then plans her entry strategy. A number of entry strategy options are made available for firms to choose from. Firms may either choose for enter the foreign market through distributors or agents or through direct methods such as partnerships, alliances, direct sales promotion, or agreements (Johansson, 2007, p.75). The method of market entry adopted by the foreign firm venturing in a new market significantly affects the outcome and success of the firm. These entry strategies may be undertaken in form of licensing, joint venture, exporting, and direct investments. However, independent of the entry strategy chosen by a firm, their access to the market is limited. Though using intermediaries and agents results into a fasters and greater command of the market, it is relatively costly and very bureaucratic (Pan, & Tse, 2007, p.87). This im plies that the venturing/investing firm has no direct control of the market and neither has any direct link with the customers/consumers. On the other hand, direct entry methods are better in building personalized market understanding, it is limited with the fact that the foreign firm will not have any control of the ma

Sunday, August 25, 2019

How did the French & Indian War shape the American Revolution Essay

How did the French & Indian War shape the American Revolution - Essay Example This action by George Washington sparks the war between the French and the Indians1. The impact of fighting both the Indians and the French is too enormous for the British government. To recover the enormous debts incurred, the British under King George introduces ridiculous taxes on the Native Americans. The move by the British to impose heavy taxes on the Native Americans elicits anger amongst the Americans, who come up with their reactionary tactics. To show their anger, the Americans start to boycott the British commodities that were highly taxed. Protest groups break off and start protesting against the brutal imposition of taxation on the American soil2. Sam Adams, an outspoken leader, leads protests in parts of Boston. Most officials from the American counties join sooth and demand for justice and fair representation. More reactionary actions from the Americans start slowly and become a very strong movement of revolution against the

Saturday, August 24, 2019

Research design exercise on Domestic burglary Literature review

Research design exercise on Domestic burglary - Literature review Example In handling burglary situations, these facts need to be examined in relation to the facts of the context at hand (Tilley, 1993). When applied to the case at hand, we can identify the increase in assets in the buildings motivates offenders. The increase in student occupancy increases the vulnerable target group drastically. And also, the ease of burglars slipping through the back of the houses makes the student households vulnerable targets. In attempt to deal with these burgaries, Mayhew et al (1976) recommend that there is the need to reduce access and increase risk detection. This therefore forms the framework for the prevention of these student burglaries. In operationalising the research, there is the need to formulate hypotheses. A hypothesis is a tentative statement that is tested for its truthfulness or falsity (Kothari, 2005). So for the ease of doing this research, the objectives will be translated to the following hypotheses: The research will therefore seek to accept or refute these hypotheses. This will form the basis for a choice of either the fixing of gates in the alleyways to impede the escape of burglars and their detection or run a campaign to enable the residents to identify signs of theft and take necessary actions through better security systems like alarms and more secure windows. This will be complemented by data on the total number of residents. This will aid in comparison. Also, the frequency of burglaries must be known. This should show the general picture and also the frequency amongst student households. This data on the numbers of people living in each housing unit can be collected from the housing authorities in the area. Data on burglaries and their frequencies can be attained from the police archives. The next set of data to be collected should be the number of assets each household possesses. This will be complemented

Friday, August 23, 2019

Sports, Entertainment and Media after the 2nd World War Essay

Sports, Entertainment and Media after the 2nd World War - Essay Example By associating physicality with masculinity, certain sports/activities are labeled as either being masculine or feminine, depending upon the physical nature of the activity. Sports in which the use of body is forceful, dominating or aggressive, are considered fit for males because they are indicators of male power and thus, a definitive expression of physicality. But according to Lisa McDermott, physicality is suggested to be the complex interplay of the body perception, the agency and self-perception and is related to the qualitative understanding the lived-body as experienced and understood by the women when they are involved in sports or physical activities. To explore the meaning and significance the women derive from experiencing their bodies/themselves through these activities and the effects of these experiences greatly helps in shaping their understanding of their physicality beyond that of appearance in particular. By doing so she tries to help us understand the physical and social effect these experiences have on women in identifying themselves. In reference to the research carried out by Lisa McDermott; "Towards Understanding of Physicality, Within the Context of Women's Physically Active and Sporting Lives," this paper will examine female physicality in relation to sports and my chosen game; "Netball." It will discuss how society and media projects and labels certain sports only for males and how the females are subjected to unequal status as being physically weak. The paper will also look into the gender relations based on social and cultural norms. The last part will assess, to which extent; taking part in physical sport has changed the concept of female physicality, subjectivity and gender relations in relation to the existing social norms. Sports and gender Sports in the minds of many, is considered a "gendered" activity which reinforces male power. The stereotyping of the so called "biological difference" between males and females in the past w as used as the basis of exclusion of females from sport. Within the literature of sport sociology, we often find physicality linked with power related to physical power and masculinity. Even though the postmodern society holds out the likelihood of a post-gender society, gender as a system signifying differential values still exists (Firat, 1994) with sport such as rugby, football, ice hockey or boxing, and women still looked at as wives and mothers. An example in this respect is golf, where mothers on golf courses are more likely to be labeled deviant and asked to account for the care of their families than fathers on golf courses (West, Candace and Don H. Zimmerman, 1987). Although there are other sports which reflect physical strength and women are actively participate in them, but I'll discuss netball here in relation to physicality. Netball as a sport, which was earlier cited as only for females, entered a new era after the 70s when it began to be restructured into a profession ally administrated sporting organization and better funding.

Thursday, August 22, 2019

Fairy tale retold Essay Example for Free

Fairy tale retold Essay Hi, my name is Wittle Bear. I’m 3 human years old, and I have a story to tell about a little girl that one day decided to invade my home and eat all of my yummy food! This may be a very scary story to those of you who love porridge as much as I do. So please be prepared to be scared of blondes, I know I am! It was a sunny day in the forest when my family and I decided to take a walk. We made porridge before we left, but it was too hot to eat right away. Therefore we wanted to our lunch to cool down the only way we knew how to, go look for berries near our cottage! We were picking berries from the tallest trees we could find, I was too short to reach any so I had to get papa bear to pick me up to reach the bottom branch! My bear family and I almost had 4 baskets full when all of a sudden we heard a loud bang coming from the direction of our house! Papa and momma bear started running as fast as they could towards the loud noise which of course left me behind. When I finally caught up to them at our house, I walked in and saw the living room and dining room destroyed! The sight of this made me instantly start crying, but not as much as when I saw all of my porridge was eaten! If the porridge wasn’t enough, I went into my room and found a blonde girl sleeping in my little bed! I ran to my papa and momma and told them what I saw. My parents went into my room and started growling which caused the blonde girl to jump up as fast as she could and run out of the house. After she left I have never felt the same about blonde girls! I now eat my porridge no matter how hot it is and always carry a bottle of â€Å"blonde girl be gone† spray!

Wednesday, August 21, 2019

Mobile phones Essay Example for Free

Mobile phones Essay In this high-tech fast world, undeniably, mobile phones became an inevitable part of everybody’s life without any age limit. Although, it has lots of merits, in my point of view, the intense use of mobile phones among children may be discouraged because of its adverse impacts on them. To begin with, mobile phones have numerous benefits. Presently, it is not merely a simple device, which allows an easy connectivity between people. It is supporting a number of other programs such as calculators, alarm clocks, voice recorder and so on. these programs boost their academic performances, if they use it cleverly. For instance, alarm clocks in mobile phones are useful for them to woke up early in the morning or adjust the time duration to write an essay. The easy accessibility of parents and friends make them comfortable and enable them to meet any emergency or unexpected conditions. Parents also will be much relaxed, as they know their children are safe. On the other hand, these wonderful devices have negative sides also. Most importantly, the radiations from these devices are harmful for their developing brains. Researches proved that, these radiations might lead to cancers. The destruction of studies is another matter of concern. The games in the mobile phones create additions to children. Chatting and telephonic conversations with anonymous people may result in insurmountable impacts to their young minds. These contacts may indulge them in bad company and mafia especially drug and sex, spoil their future. Furthermore, easy connectivity to internet attracts them to unhealthy web sites and their total character may change. Additionally, children can effortlessly cheat their parents by convincing a false. To illustrate, if they are enjoying a television program at his friends home, they can make to believe their parents that they are on the way to their tuition class. To conclude, mobile phones are beneficial devices, if we use it sensibly. Children, as they are not mature to handle it effectively, it may leave drastic disadvantages on them. Hence, I believe that mobile phones are not favorable for children, especially if it is used uncontrolled without proper guidance and time limit.

Comparison of Database and File Storage

Comparison of Database and File Storage Author: Noronjon Qalandarov CONTENTS (Jump to) ACKNOWLEDGEMENTS SUMMARY 1. INTRODUCTION 2. AIMS AND METHODOLOGIES 3. LITERATURE REVIEW 3.1 Technologies and definitions 3.1.1 RDBMS 3.1.2 Native XML DB 3.2 DATABASE PRODUCTS 3.2.1 MySQL database 3.2.2 eXist and Sedna databases 4. DATABASE BENCHMARKING 4.1. Storing XML in file systems 4.2. Document size 4.3. Updates 4.4. Description of soil sampling and sample preparation 4.5. Determination of pendimethalin in methanol extract 5. ANALYSIS 6. DISCUSIONS 7. CONCLUSIONS 8. REFERENCES ACKNOWLEDGEMENTS First of all thanks to my supervisor Ing.Alexandr Vasilenko for advices and assistance during the work on this diploma thesis and all his support during whole practical work. Special thanks to all members and coordinators of Europian Commission Erasmus Mundus program, especially to coordinator of CASIA project Ewa Wietsma and PhDr. Vlastimil ÄŒernà ½, CSc. for granted me and gave me opportunity to study at Czech University of Life Sciences. I also would like to thanks to Department of Information Technologies, represented by Ing.MiloÃ… ¡ Ulman, Ph.D. for his professional skills, for kindness and support. Thanks to all academic staff of university for their contribution to obtaining high-quality skills and knowledge. SUMMARY Database systems are well-known for consistent storage, retrieval, and manipulation of data. At the same time, the Extensible Markup Language (XML) is generally accepted as data description language for both web-based information systems. XML is self-desibing. It can provide flexible information identification, and can be extensively used in many application domains such as chemistry, biology, and e-business, etc. With the development of the web applications and the large amounts of XML documents that are being generated, it is therefore necessary to work out how to manage them efficiently. Databases are the prime storage engines for many different types of data. Traditional DBMS are designed for regular data. However, XML data often includes some irregular data such as pictures, audio and video files etc, which means that the storage of XML data is a challenge to traditional relational database DBMSs. Keywords: XML, RDBMS, database, relational databases, storage, data and file, analysis, solutions, software, web application 1. INTRODUCTION As the use of XML has grown, it is now generally accepted that XML is not only useful for describing new document formats for the Web but is also suitable for describing structured data. Examples of structured data include information that is typically contained in spreadsheets, program configuration files, and network protocols. XML is preferable to previous data formats because XML can easily represent both tabular data (such as relational data from a database or spreadsheets) and semistructured data (such as a Web page or business document) (Obasanjo, 2003). Popular pre-existing formats such as comma separated value (CSV) files either work well for tabular data and handle semi-structured data poorly, or like RTF are too specialized for semi-structured text documents. This has led to the widespread adoption of XML as the lingua franca of information interchange. As more and more organisations and systems employ XML within their information management and exchange strategies, classical data management issues pertaining to XML’s efficient and effective storage, retrieval, querying, indexing and manipulation arise. From this environment we have seen the emergence of native XML databases. These are designed for seamless storage, retrieval, and manipulation of XML data and integration with related technologies (Noordij, 2002). However, a number of questions arise regarding Native XML Database (NXD) technology. Does it represent a paradigm shift? More importantly, is the performance of NXD technology sufficient to provide an alternative to standard database technology, or will existence be the status quo? 2. AIMS AND METHODOLOGIES The diploma thesis investigates the advantages and disadvantages of storing data and files in native XML databases and relational databases. Main goal of this diploma thesis is to compare the approaches of a number of varying solutions. Partial goals are: To explain the main differences between the database models; To compare different solutions of storing data in different platforms; To analyze performance of XML and RDBS models (size, speed, access, etc); The several methodology parts are defined to accomplish the thesis. The methodology of the diploma thesis is based on research and analysis of relevant information resources. In the first part collected the necessary information about the database models. The further step was to define requirements of the database systems in order to exactly characterize the system processes. Within this requirements the definitions, the tables and the graphs are also fulfilled due to properly do the practical section of the thesis. Practical process and analysis will draw on results which will be given by the research study. Finally, comparison of analysis of the storing data models and file storage made in a different development platform will be made. Based on the synthesis of the theoretical and the practical knowledge, final conclusions will be formulated. 3. LITERATURE REVIEW 3.1 Technologies and definitions In this chapter we define all terms and technologies needed to understand rest of this paper. We start by basic definitions (e.g. what is an XML document), continue by characteristics of XML documents (e.g. what is a depth of an XML document) and their schemes and finish by benchmark related definitions (e.g. what is an XMLMS). Definitions also contain examples when it is appropriate. Relational data storage unit implemented in the framework of powerful databases such as MS SQL Server, Oracle, MySql, etc. actually able to meet all requirements for the server machines. At these facilities are built and successfully operate the systems from a variety of online stores to systems of automation of bank activity. High performance, reliability, and advanced administration tools allow for functionality and scalability within a large range of tasks. But the relational concept of data presentation within storage demands reduction them to relational structure, that means allocation from stored these same objects and placing them in line by one or a group of tables, that is the fixed and unchangeable structure. As a result, the limit of applicability of such systems lies in the field of tasks over strictly structured data. There are solutions of unification of relational object for storage of poorly structured data. But they, as a rule, lead to sharp losses of productivity an d to increase in labor input of development and support of all system on the basis of such decision as complicate storage structure, lead to partial refusal of control devices of integrity given by the server and to strong complication of inquiries. Applying as a data presentation basis within storage the xml-notation, it is possible to lift limits on rigid structurization of data and to receive the device of storage of diverse data. Such approach is used in servers Tamino, MarkLogic Server, Sedna, Timber, etc. Besides, xml became de facto the data presentation standard in information systems. However, the effective use xml to develop application systems currently constrained in particular multi-user access restrictions, and low-speed transactional mechanisms work with large data files. XML has several advantages over other languages à ¢Ã¢â€š ¬Ã¢â‚¬ ¹Ãƒ ¢Ã¢â€š ¬Ã¢â‚¬ ¹/ formats of the description of data at exchanging data between applications: Platform independence. The XML language allows exchanging data to the systems which are based on different platforms. The XML document can be created and sorted as the text file by means of outdated or built-in programming languages whose composition does not include a special library for working with XML. Support by producers. Libraries for work with XML are created for all leading programming languages and popular DBMS. Use of these libraries allows significantly reduce the amount of code when developing gateways between applications. Self-documenting. The XML document is readable for the person. Besides, existence of the date description in it allows creating automatic processing programs, for example universal modules of loading of the data arriving from different systems into a one repository. Hierarchy. A key feature of the language. In difference, for example, from the CSV format (the text file with a divider ;), XML allows to describe easily difficult structures of the objects given with an unlimited enclosure. Objectivity. The data structure of XML is perfectly combined with object-oriented programming model. Each tag of the XML document can be mapped to a class or class property of the processing program. On the other hand, there is an opportunity to describe in a XML format each applied object of subject domain as a separate tag. Expansibility. In use of XML format, you can add new tags. It wont lead to fatal change of data structure, simply reading and writing programs will need to be added with classes or the functions that recognize these tags. Safe and efficient management of large volumes of data is a challenging task, which is traditionally solved by database management systems. When storing XML data, it is necessary to provide reliability, the transaction nature, recoverability, high availability, security, effective search device and scalability and modification. All these requirements define the necessary tools and functionality of the XML data storage systems and limit the applicability of existing technologies and resouces. RDBMS Relational databases are widely used. They encapsulate the storage and data processing mechanisms, offering effective methods for structured data storage for faster query execution. On the other hand, XML is a data format used for exchange of non-structured data between incompatible systems or applications. Application of relational database is limited, but the obvious advantages of XML representation in the allocated task areas are relevant in todays systems. Let’s consider the key differences between relational and XML-data. Neither XML nor relational format is definitely the best solution for any problem. There are various data management needs for which relational data model is insufficient and the use of XML allows improving the solution characteristics, reducing the complexity and sometimes recognizing task feasible. In a relational database, data is stored in tables consisting of rows and columns. The data of a certain type is stored in column for all of the table records. Each table record is presented in the row. Order of the rows in the table is not associated with any ordering of data, unlike XML, where internally present document order affects, for example, the data returned by such function XPath, as position (). Only the simplest relational data can be stored in the same table, a typical relational database has many tables with complex logical relationships between them. Data in different tables are linked by keys. For example, in the table Customers can be a field (or column) CustomerID. Identification of orders for a particular user is made easy by the corresponding value in the column CustomerID of the table Orders. The data relationships can be one-to-one (for example, one son can have only one father, one-to-many or one son, two parents, one user has several orders), or many-to-many (one item can be in many orders, and each order can be different goods). Each of these relationships can be represented by storing data in two or more related tables. Native XML DB Generally distinguish databases XML-enabled and native XML database opportunities. The database is called XML-enabled, if it is a model of data storage kernel and data processing is not XML data model. In many cases, its core is relational model that requires a mapping between XML data model and the relational model. All relational database systems can be considered as XML-enabled database, because they support such a mapping for XML data management. The term native XML database is used in different ways by different groups. Native XML database has the following three characteristics: It defines the logical model for XML-document. The data is stored and selected according with this model. The model must include elements, attributes, PCDATA, and document order. XML-document is the basic unit of logical storage. No specific physical model of storage is required. It means that it can be based on relational, hierarchical or an object-oriented database. In particular, this definition allows transformation from the XML data model to another model of data storage and processing. This is what we have defined for XML-enabled databases. Thus, it is required to native XML database also has the following two properties: XML data model (XML Infoset) fundamental logical data model, which is used in the database and is available to database users if data type is an XML. XML data model is the basic unit of a physical storage of XML-data without displaying them in a different data model. This brief definition means that XML is not just extended data type, this is how the data is processed, both logically and physically. The data presented in XML, schema correspond to the physical scheme of storage on disk. This model is best for efficient search of XML-data. DATABASE PRODUCTS MySQL database eXist and Sedna databases DATABASE BENCHMARKING Storing XML in file systems We should not forget that the most of XML-documents are stored in file systems. The idea XML-document means storing on disk, just as you keep any of other documents on your desktop. Many applications do not ever go further this first step, and always keep XML-documents in file system. Storing XML documents in file system simple and natural, not only because the term â€Å"XML document† means it, but also that the hierarchical organization of file system is very similar to the hierarchical organization of the document. There is a clear parallel between the syntax of the URL or file path and simple XPath expressions, so it looks quite natural appeal to the node â€Å"/bat/baz† in the â€Å"/foo/bar.xml†. Before moving on to the â€Å"real† XML databases, consider, what are the limitations of XML documents storing in file systems. XML data internally ordered, as in this simple example: Value=123.45 Currency=US Dollars /> Value=4500.12 Currency=US Dollars /> Value=8000.00 Currency=US Dollars /> Document size It makes sense to store XML documents on disk when you need to work with static small sized documents in WWW. File systems can now effectively support gigabyte files; so, knowing a path to any XML document, you can effectively get access to information which was stored in it. Important factor is granularity of information to which access is required. If you always need the complete document, this system works quite well. However, if you need to retrieve only a small part of a large document using DOM or XPath, then you have huge overhead due to having to read all document before you will be able to extract from it part you are interested in. Also, you must do not forget to analyze these documents whenever you access them through the DOM or XPath. Of course, this consideration applies only to this type of work with documents. If all you need is to work with documents without their modification or transformation on WWW, it is better to prepare them to work in XML. Updates Another important question arising during the storage of XML documents on disk are updates. If you manually run a small set of well-formed XML documents on the desktop or the web server, the updates do not cause difficulties. But once you need to enable the updates by many users, or even worse, if you develop a transactional application, you need to take some additional steps to perform updates. One of ways of solution this problem is the storage of documents in the repository WebDAV, which resolves issues of blocking and the parallel addressing instead of you. If you are interested in this approach, you can try to use a version control system such as Subversion (http://subversion.tigris.org/). Subversion can work as a WebDAV repository and provides all the features of version control system, including the fixing of any modifications history of your documents. For many applications it is very important opportunity, and this opportunity is one of those which directly are not supported by the databases considered in this thesis. Description of soil sampling and sample preparation Determination of pendimethalin in methanol extract ANALYSIS 6. DISCUSIONS CONCLUSIONS REFERENCES Carlos Coronel,Steven A. Morris,Peter Rob. Database Systems: Design, Implementation, and Management. Cengage Learning, 2011. 692p. ISBN 9780538469685 AKMAL B EDITOR CHAUDHRI,AWAIS EDITOR RASHID,Roberto Zicari. Xml Data Management: Native Xml and Xml-Enabled Database Systems. Addison-Wesley Professional, 2003. 641p. ISBN 9780201844528 EMC Education Services. Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments. John Wiley Sons, 2012. 528p. ISBN 9781118236963 Vrana,I. Projecting of information systems with UML, CULS Prague, 2009, 150p. ISBN 9788021319769 http://kavayii.blogspot.cz/2010/01/xml.html Comparison of relational and XML data storage methods Noronjon Qalandarov CULS, Prague 2014Page 1

Tuesday, August 20, 2019

Comparison Of King Lear And Gloucester Essay examples -- essays resear

  Ã‚  Ã‚  Ã‚  Ã‚  Shakespeare uses subplots to dramatize the action of the play and give spark on the contrast for the themes in King Lear. Sub plots usually improve the effect of dramatic irony and suspense. The latter, which is used in King Lear, gives us the understanding of the emotions of the characters in the play. This follows the parallelism between Gloucester and King Lear.   Ã‚  Ã‚  Ã‚  Ã‚  In King Lear, the subplot of Gloucester corresponds to the major plot of King Lear. Both fathers have their own loyal legitimate child and their evil and disloyal child. They are both honourable men, who have children that return to them in their time of need. Gloucester and Lear are both tormented, and their favoured child recovers their life. In the early beginning of the play, Cordelia says that her love for her father is the love between father and daughter, no more, no less. Unhappy that I am, I cannot heave My heart into my mouth. I love your Majesty According to my bond, no more nor less. (Act 1 Scene 1 Pg. 13 lines 93-95) In response, King Lear goes into rage, and divides Cordelia’s share of the kingdom between her two unworthy sisters. Such injustice is encountered by Gloucester in the subplot. O villain, villain! His very opinion in the letter! Abhorred villain! Unnatural, detested, brutish villain! Worse than brutish! Go, sirrah, seek him. I†™ll apprehend him. Abominable villain! Where is he? (Act 1 Scene 2 Pg. 37 lines 75-78) Gloucester fool...

Monday, August 19, 2019

JOB DESIGN AND JOB CHARACTERISTICS :: essays research papers

Job design and job characteristics are very interesting topics for discussion. In my opinion the modern route, that of fitting jobs to people, is the best decision a manager can make when designing jobs. It leaves employees more space to experience new challenges and take more responsibility in their job. While reading the Overview of the Job Characteristics Model each of the concepts mentioned brought several examples in my mind. I do not want to cite the concepts from the book, but I will give some examples from my own experience and that of my colleagues. The organisation where I work is undergoing several major changes, such as replacing the IT system, changing the work process and procedures, launching new products in the market, putting all the branches online, etc. This has generally lead to dissatisfaction of employees, since they are working long hours and even weekends and are not being motivated enough. Their salary has not changed and no bonuses are promised. This may lead to inefficiency and absenteeism. People may be less efficient to finish work earlier and even take sick leave from work to be more with their families. Another issue related to the change is that employees are required to learn how to use this new system and procedures in a very short period of time and this has caused increased stress, apart from the fear that this change can bring about understaffing in the near future. People are really trying hard to fit into the new system and rules, but their expectations are not always met. Since I am talking about meeting expectations, I would like to be a little more specific. When I was first interviewed for the job position I currently have, I was told that I would have a salary increase. Yet, after ten months, nothing has changed – it still remains a promise. And I have even started thinking about looking for another job, at a time when I didn’t even think about leaving my current job. Unmet expectations can lead to such situations and managers have to be really careful this does not happen, or at least they must try to find a system of prevention. Moreover, people feel they are not treated equally as regards pay and promotions. There are new employees coming in the organisation and they receive higher salaries than the existing employees, who have been working there for years and have much more experience.

Sunday, August 18, 2019

History of the Computer :: essays papers

History of the Computer The history of the computer can be dated back for years and years and there is still much more to learn and know as we advance our knowledge with this technology. Webster's Dictionary defines computer as, â€Å"any programmable electronic device that can store, retrieve, and process data† (A brief 2004). The core word compute in computer has been termed for over 2000 years. In the beginning, a wooden rack holding strings by two horizontal bars was the very first calculator recorded. The beads were manually moved around by the user and were only used by the user who knew the rules of programming in order for the wooden calculator to be accurate. It is said that the wooden calculator was able to do all regular arithmetic (Meyers 2001). The many different parts of a computer as we now know it did not just appear in one machine created by one person. Starting in the 1640’s, many people began to work on machines that would mechanize tasks, with results that we still use today (In the beginning 2004). Records exist of earlier machines, but Blaise Pascal invented the first hand powered commercial calculator that can add numbers entered with dials (Meyers 2001). He is credited with building the first digital calculator. Although attempts to multiply mechanically were made by Gottfried Liebnitz in the 1670s the first true multiplying calculator appears in Germany shortly before the American Revolution (A brief 2004). Charles Xavier created the first successful calculator which was able to add, subtract, multiply, and divide (Meyers 2001). In the early 1800’s, Charles Babbage began a life long quest for a programmable machine. (A brief 2004). He invented machines that are called as calculating engines. Engine number one was the first successful automatic calculator that was able to work on its own. This calculator consisted of over 2000 parts (The early 1996). A large problem that Babbage had would be many engineering problems which would not allow his engines to work correctly. He is remembered and is important to computer history because of his idea for the machines. His basic ideas of how the machine would process information is still used to this day (In the beginning 2004). As the late 1800’s came around, a man named Herman Hollerith developed a computing machine that can read into punched cards.

Saturday, August 17, 2019

Discuss the significance of the chapter titles of the novel in regard to theme in Amy Tan’s The Joy Luck Club

In Amy Tan's The Joy Luck Club, as in most other existing novels, the titles of each chapter holds a distinct significance in regard to the content of that chapter. It could be argued that Amy Tan selects the words for her titles carefully in order to attain the highest level of analogical, and metaphoric purpose from them. An analysis of each of the chapter titles in regard to the main ideas and messages Amy Tan is putting across highlights the purpose of each of them, and displays the metaphoric and analogical concepts that each hold. The title of the first chapter is a repetition of the title of the book. Amy Tan probably does this deliberately so as to focus the reader. The title itself, The Joy Luck Club, directly refers to the name of a club formed by all the four mothers in the book. At this club, all the mothers who are the co-main characters in the book are members. Around the Mah Jong table, the four women gossip and gamble. This is the most likely cause of the name, The Joy Luck Club, in the way that it was fun and enjoyable talking and telling tales, but one also needed luck in order to win the games of Mah Jong. The Joy Luck Club is founded by the women immigrants, so as to keep a part of Chinese tradition alive in the new world they were in. This is backed up partially by the quote in the book, â€Å"My mother started the San Francisco version of the Joy Luck Club in 1949† (6). The chapter is mainly focusing on the human needs to be surrounded with feelings of familiarity; the reason the club wa s founded in America. Scar is the title of the second chapter. As a representation of the sequences in the chapter, the title gives us a good basis as of what to expect in the chapter. For example, a scar is the result from someone receiving a deep wound. This is the case as the plot in this part of the book is about a little girl who gets burnt, has a mother who left her, and whom she eventually sees again. The title also holds an analogy. That is the analogy of the emotional healing process. Amy Tan uses this analogy in describing the pain inflicted upon the girl, by the mother, in relation to the pain inflicted on the girl by the hot soup. This analogical and metaphoric purpose Amy Tan intends with this can be directly drawn from the chapter itself In two years time, my scar became pale and shiny and I had no memory of my mother. That is the way the way it is with a wound. The wound begins to close in on itself, to protect what is hurting so much. And once it is closed, you no longer see what is underneath, what started the pain(40) This seems to be the way, in the human emotional and physical healing process, it takes time. Amy Tan uses the title, The Red Candle for her third chapter. In the plot of this part, a daughter of one family is being married to a man from another family. In the festivities, it is Chinese tradition to light a candle that has two ends. This represents the longevity of the marriage, and the commitment of the two involved. As the main plot in the chapter is the marriage the title reflects the content, and so is another good selection by Amy Tan. In regard to the theme of this chapter, the red candle, is representing the strength of the marriage, stated in the book, â€Å"That red candle was supposed to seal me to my husband and his family, no excuses afterward†(55). If the candle goes out the marriage is not strong, where as if it doesn't the marriage can never be broken, â€Å"‘This candle burned continuously at both ends without going out. This marriage can never be broken'†(54). As the burning candle represents the impermanence of a marriage, as there is no way a candle, in the situation as the one in the book, could burn to the end without going out, the girl who actually blows it out, along with the wind, and the servant who leaves the candle unattended all represent the intangible forces a marriage encounters. In all, the red candle has a very metaphoric purpose in this chapter, as a title, and theme. The Moon Lady is the title of the next chapter. The title comes directly from the name given to a particular demigod in the Chinese tradition. As the plot of this area focuses mainly on the Moon festival, celebrating the Moon Lady, and the little girls wish to the Moon Lady, it would appear that Amy Tan has chosen an appropriate title for this part. The main idea the author is trying to put across here is the reliance and desire for hope that human society has. Therefore beliefs that support the idea of hope, even in an irrational form, such as the idea of a moon lady, are popular. The idea of this is backed up in the book, â€Å"It is my earliest recollection: telling he moon lady my secret wish.†(65). The Moon Lady is symbolic of hope. In the next chapter, the title is relatively straight forward in its relation to the Content. The Rules of the Game, is referring to the rules of chess, the game that the young child is playing. This chapter is also showing the learning that is coherent in life, that the girl is experiencing. So this chapter title was selected for that purpose, showing the rules the girl is learning. The author uses the word rules, as a metaphor for life's experiences, and how to deal with them. In human society, there are many different situations which require a certain way to act, that is not written, or spoken, but expected, and needed in order to survive. In Chinese society however, there are many ways to approach situations that are spoken about. These are the rules. The game is a metaphor for life. So Amy Tan uses the title in a very blatant and a very subtle metaphoric way. In chapter six, the title The voice from the wall is given. In the physical sense, the voice from the wall is the voices of the mother and child fighting next door, to the girl in the story. In a metaphoric sense, the title is given as to represent a different side of thought. For instance, in the story, the girl misinterprets what she is hearing from next door as murder rather than just a fight occurring between a mother and child, â€Å"She didn't seem like a girl who had been killed a hundred times. I saw no traces of blood-stained clothes†¦Ã¢â‚¬ (115). This title is hinting at the human side of us that limits our way of looking at things. It is suggesting that at times we perceive one thing when really it is another, grabbing the wrong end of the proverbial stick. The voice in the title is the other view of the situation, and the wall can be seen as the situation. Amy Tan here again uses her title to perform a discreet metaphoric purpose. The chapter title, Half and Half arises from the daughters realization of how fate is formed. She sees fate as being the result of two things, expectation and inattention, â€Å"And I think now that fate is shaped half by expectation, half by inattention†(140). This title is used to reflect the troubled marriage of the daughter in this story, and the loss of a little boy. The author is focusing on the area of human behavior that leads to events caused by our unlimited expectations and ignorance leading to inattention. The title has no sense of physically describing anything in the story, as in previous chapter titles. The next chapter is a story of a child, whose mother forces her to learn the piano, in the hope of her becoming a prodigy. This chapter is entitled Two Kinds. As a title it holds little significance physically until the end where the daughter finds two halves to a piece of music she once played, â€Å"And after I played them both a few times, I realized they were two halves of the same song†(155). In relation to theme, the title holds a strong relation to the main points of emotional duality that the author is touching on. The main idea, being, the two sides of a mind that see things from different perspectives. There is the side that always an endless capacity to desire, and the side that makes us grateful for what we already had. This is summed up in the book, â€Å"†Pleading Child† was shorter but slower; â€Å"Perfectly contented† was longer but faster†Ã¢â‚¬Ëœ(155). This supports the idea of the daughter of the seeing the two sides of her life as a child, the way she saw it then, ‘Pleading Child', being pushed around and wanting more than she had, and the way she sees it now, ‘Perfectly Content', she realizes she had a good mother and a good life. The ninth chapter in The Joy Luck Club, is called Rice Husband. The title comes from a story the daughter was told by her mother. This was about the grains of rice she left in her bowl becoming the number of pockmarks on her future husbands face. The title relates to the main plot, as the story is set when the daughter has now married her husband, and is having her mother to stay with her for a while. The title has little other significance, other than the quality of the daughter husband reflecting the times she left rice in her bowl. The husband is not very nice, â€Å"I'm sitting on the sofa, seething, and I don't know why. It's not that Harold has done anything wrong. Harold is just Harold†(178). If a husband can annoy you with out even doing anything he must really not be a good husband. The pock marks in the fable meaning the impurities of your husband, of which the daughter's obviously has many. As with the last chapter the title Four Directions holds very little significance in an analogical or metaphoric sense. There seems to be no underlying or hidden reason for Amy Tan using the title, other than it is the name of the restaurant that the mother and daughter go to. Four Directions is the name of the place, â€Å"I said as we waited for the lunch bill at Four Directions†(184). The next chapter called Without Wood, is given to describe a characteristic, or lack of that the daughter has. The title has no physical relation to any of the events in the story here, but has the purpose of describing the type of person the women is. In the Chinese tradition, people contain certain elements, such as metal, water, fire and wood, to name just a few. Each of these holds a certain key to some ones character, and each need to be balanced with on another. In the story, the woman has a very indecisive side, and relies on others to make important decisions in her life, this is supported in the book, â€Å"I sat there quietly, trying to listen to my heart, to make the right decision. But then I realized I didn't know what the choices where†(213). This, in Chinese tradition is due to the fact that she has not got enough wood in her. This is the reason Amy Tan has used the title she has, taking something from her culture and introducing it to the reader. This is at fir st difficult to see but after recalling earlier parts of the book the title makes sense. In regard to theme, the title again is just pointing out what the author is trying to convey, and that is the varying characteristics that separate us as human beings in to individuals. The Best Quality, the name of the twelfth part of the book, is given for to reasons. As a title it touches the theme in a sense that mothers always want the best for their offspring, which is no different to the mother in this story. The best quality meaning the best quality of life that a mother can give her children. The title is also given in relation to the events held in the story. In the plot the mother is holding a diner where crab will be served and whilst picking the crabs, she picks one which is missing a leg, which is served at dinner. At the diner, the mother and daughter are last to pick, so the daughter goes to pick the crab with the missing leg, but her mother insists she takes the good one, â€Å"I thought I was doing the right thing, taking the crab with the missing leg. But my mother cried, â€Å"No! No! Big one, you eat it. I cannot finish†Ã¢â‚¬ (227). Hence, the mother always wants the best for her child. The next title named Magpies, has very little relation to the theme in this area of the book. It rather holds as a direct reference to a story within the story. A story of birds mocking peasants, who revolted and killed the birds, is told, The birds became more exhausted, unable to land, unable to eat. And this continued for many hours, for many days, until all those birds-hundreds, thousands, and then millions!-fluttered to the ground, dead and still, until not one bird remained in the sky(273) So again in this chapter the title holds no significance in regard to the theme in this story. Waiting Between the Trees, the title given to the fourteenth part, is significant in terms of the theme here. This part of the book is describing a mother's actions in her life, and using the analogy of a tiger to make us further understand the authors main points. In this chapter Amy Tan is commenting again on the duality of the human mind. She is saying that there is a part of humans that makes itself visible and conspicuous in its actions and another part that is more hidden and subtle in its actions. This is explained in the tiger analogy the author uses. Then she told me why a tiger is gold and black. It has two ways. The gold side leaps with its fierce heart. The black side stands still with cunning, hiding its gold between trees, seeing and not being seen, waiting patiently for things to comes(282) This is another example of Amy Tan's creativeness in her titles, subtle but very meaningful. The next chapter entitled, Double face. This is in reference to the part of this story where the mother and daughter are comparing their faces and seeing how much they look like each other. Double faced means a person who has two ways of acting, which are done in different situations. This is the main them in this part. Amy Tan, again, is commenting on the twin sidedness of human behavior. How we are nice to some one to them, and nasty to them when they are not around. This is explained in the book, â€Å"It means we're looking one way, while following another. We're for one side and also the other. We mean what we say, but our intentions are different†(304). This is a trait of humanity, and a necessary one in some circumstances. So in regard to the theme, the title holds significance in the way that it is using a term that describes a characteristic of human conduct. The last chapter title, as with many in the second half of the book has little significance to the theme of the story. The name A Pair of Tickets, is really just a physical explanation of what to expect I the story, in which a daughter and her father fly to China from America. Two tickets, two people, and a logical choice for representation of the plot in the story, however not for any thematic reasons. This is also a good selection of title by Amy Tan, as it rounds the book off, as the first chapter is about the woman getting tickets to meet her family, the last is about her using the tickets. Overall, Amy Tan has used a wide variety of chapter headings, ranging from ones with deep analogical, metaphoric, and thematic meanings, others with simple physical pointers to events in the story. The selection and timing of the headings also leads to provoking a strong thought process of the reader as to the author's intentions with the names of her chapters. Amy Tan has written a clever, thought inciting book, which although at times is exceedingly boring, is still none the less an intelligently written piece of literature.

Friday, August 16, 2019

California Science Center

If you become a member, you become, as stated by the California Science Center website, â€Å"part of a dynamic, innovative community dedicated to our mission to stimulate curiosity and Inspire science learning In everyone by creating fun, memorable experiences. † If you do not want to ay to be part of a wonderful organization, you can volunteer by turning In an application either by e-mail, fax, or by sending a letter to the Department of Volunteer Resources. In order to volunteer, however, you must be at least 16 years of age.Looking at the application, I believe that all elements that you are to put down are viable, and I would not change a thing. The history of the science center is as such. It started in 1912 and mainly housed agricultural innovations form around the world; that is until after the war. In 1951, nice a boom in technological advances was more prevalent than agriculture, it the name was changed to the California Museum of Science and Industry, and mainly hou sed technology In an urban environment. In 1987, It was once again transformed.This time, the Museum went through a drastic change, and was turned Into a state- of-the-art science education facility. Its Intended use was to â€Å"respond to the needs of diverse communities and a state that continues to grow and evolve† and was then renamed the California Science Center. Future growth entails becoming the largest science center in the western united States, and housing exhibits from worlds beyond, and a South East Rainforest's. In the Ecosystems exhibit at the California Science Center, there are eight different zones.These zones are: the Extreme Zone, the Forest Zone, the River Zone, the Island Zone, the Rot Room, the Global Zone, the L. A. Zone, and finally the Family Discovery Room. The Extreme Zone consists of many ecosystems, all of which have a common theme; It Is very hard to survive there. An Important principle that I believe should be explained to the public Is that although these ecosystems are harsh, they are still vital to our planet. The Forest Zone Is not the typical forest that we think of, that's because It's a kelp forest.An Important principle that I believe should be explained to the public is that life originated from the sea, and kelp forests like this form the Lovers Torts AT Tie Tanat we see t ay I en River Lone consists AT asana Ana water. An important principle that I believe should be explained to the public is way that water and natural waterways are important because they carry energy and materials from lace to place. The Island Zone is a zone dedicated to evolution and adaptation by the animals that live there.An important principle that I believe should be explained to the public is that evolution is a genetic fact. The Rot Room has to do with rotting organisms, like trees and animals. An important principle that I believe should be explained to the public is that these organisms that decompose other organisms are vital bec ause they make the soil ready to support new life. The Global Zone is about ecosystems and their interactions. An important principle that I believe should be explained to the public is that the Earth itself is one giant ecosystem.The L. A. Zone deals with urban ecosystems, and the daily challenges faced. An important principle that I believe should be explained to the public is that little things like running water and trash service are extremely complicated things. Finally, the Family Discovery room deals with how our homes and habitats provide us with food, water, and shelter. An important principle that I believe should be explained to the public is that e should not take our homes for granted, as others around the world are not as fortunate as us.The Elephant Clock is a Unusual striking early 13th century clock whose design fuses together elements from may culture,† and was invented by Al-Izard. It was created in the 13th century. It works by using Greek water raising tec hnology. It is considered to be multi-cultured because it â€Å"uses Greek water raising technology, an Indian elephant, an Egyptian phoenix, Arabian figures, Persian carpet, and Chinese dragons, to celebrate the diversity of the world. †

Indian Parliament

PARLIAMENT IN INDIA AND SHORT NOTES ON OTHER PARLIAMENTS By, T. Vishnu, IX A. The  Parliament of India  is the supreme  legislative body  in  India. The parliament house originally known as ‘Council House ‘, founded in 1919, the Parliament alone possesses  legislative supremacy  and thereby ultimate power over all political bodies in India. The Parliament of India comprises thePresident of India  and the two Houses,  Lok Sabha  (House of the People) and  Rajya Sabha  (Council of States). The President has the power to summon and prorogue either House of Parliament or to dissolve Lok Sabha.The parliament is  bicameral, with an  upper house  called as Council of States or  Rajya Sabha, and a  lower house  called as House of People or  Lok Sabha. The two Houses meet in separate  chambers  , in New Delhi. The Members of either house are commonly referred to as Members of Parliament or MP. The MPs of Lok Sabha are elected by  direct election  and the MPs of Rajya Sabha are elected by the members of the State Legislative Assemblies and Union territories of Delhi and Pondicherry only in accordance with  proportional voting.The Parliament is composed of 790 MPs, who serve the largest  democratic  electorate  in the world The Estimates Committee, constituted for the first time in  1950, is a Parliamentary Committee consisting of 30  Members, elected every year by the Lok Sabha from amongst its Members. The Chairman of the Committee is  appointed by the Speaker from amongst its members. A Minister cannot be elected as a member of the Committee and if a member after his election to the Committee, is appointed a Minister, he   ceases to be a member of the  Committee from the date of such appointmentTerm of Office The term of office of the Committee is one year. Functions The functions of the Estimates Committee are: (a) to report what economies, improvements in  organisation, efficiency or admini strative reform, consistent with the policy underlying the estimates  may be effected; (b) to suggest alternative policies in order to bring about efficiency and economy in administration; (c) to examine whether the money is well laid out within the limits of the policy implied in the estimates; and d) to suggest the form in which the estimates shall be presented to Parliament. The Committee does not exercise its functions in relation to such Public Undertakings as are allotted to the Committee on Public Undertakings by the Rules of Procedure of Lok Sabha or by the Speaker. Working The  Parliament of Great Britain  was formed in 1707  Soon after it is constituted, the Committee selects such of the estimates pertaining to a Ministry/Department of the  Central Government or such of the statutory and other bodies of the Central Government as may seem fit to the Committee.The Committee also examines matters of special interest which may arise or come to light in the course of its work or which are specifically referred to it by the House or the Speaker. The Committee calls for preliminary material from the Ministry/Department, statutory and other Government bodies in regard to the subjects selected for examination and also memoranda from non-officials connected with the subjects for the use of the Members of the Committee. The Committee, from time to time, appoints one or more Sub-Committees/Study Groups for carrying out detailed examination of various subjects.If it appears to the Committee that it is necessary for the purpose of its examination that an on-the-spot study should be made, the Committee may, with the approval of the Speaker decide to undertake tours to make a study of any  particular matter, project or establishment, either as a whole Committee or by dividing itself into Study Groups. Notes relating to the institutions/offices etc. to be visited are called for in advance from the concerned Ministries/Departments etc. and circulated to th e Members of the Committee/Sub- Committee/Study Group.The Members while on tour may also meet the representatives of chambers of commerce and other nonofficial trade organisations and bodies which are concerned with the subjects under examination of the Committee, for an informal discussion. When the Committee/Sub-Committee/Study Group is on study tour only informal sittings are held at the place of visit. At such sitting neither evidence is recorded nor any decisions are taken. All discussions held by the Committee with the representatives of the   Ministries/ Departments, nonofficial organisations, etc. re treated as confidential and  no one having access to the discussions directly or  indirectly, should communicate to the Press or anyunauthorised person any information about matters taken  up during the discussions. Later in the light of informal discussions during Study Tours,  memoranda received from non-officials and information  collected from the Ministry/Depart ment concerned and other sources, non-official and official witnesses are invited to give evidence at formal sittings of theEstimates Committee held in Parliament House/Parliament House Annexe, New Delhi. The observations/recommendations of the Committee are embodied in its Reports which are presented to Lok Sabha. After a Report has been presented to the House the Ministry or Department concerned is required to take action on the recommendations and conclusions contained in the Report within a period of six months. The replies of the Government are examined by the Committee and an Action Taken Report is presented to the House.The replies to the recommendations contained in the Action Taken Reports are laid on the Table of Lok Sabha in the form of Statements. While U. S. A’s parliament is called as UNITED STATES CONGRESS The  United States Congress  is the  bicameral  legislature  of the  federal government  of the  United States, consisting of the  Senate, its upper house, and the  House of Representatives, its lower house. Congress meets in the  Capitol  in  Washington, D. C.Both representatives and senators are chosen through  direct election. There are 535 voting Members of Congress; the House of Representatives has a membership of 435 and the Senate has a membership 100. Members of the House of Representatives serve two-year terms representing the people of a district. Congressional districts are  apportioned  to states by  population  using the United States Census results, each state in the union having at least one representative in the Congress.Regardless of population, each of the 50 states has two senators; the 100 senators each serve a six-year term. The terms are staggered so every two years approximately one-third of the Senate is up for election. Most incumbents seek re-election, and their historical likelihood of winning subsequent elections exceeds 90 percent. The  Parliament of the United Kingdom o f Great Britain  is the supreme  legislative body in the United kingdom, British  Crown dependencies  and  British overseas territories.The  parliament  is  bicameral, with an  upper house, the  House of Lords, and a  lower house, the  House of Commons. ]The Queen is the third component of the legislature. The House of Lords includes two different types of members: the  Lords Spiritual  (the senior  bishops  of the  Church of England) and the  Lords Temporal  (members of the  Peerage) whose members are not elected by the population at large, but are appointed by the Sovereign on advice of the Prime Minister . The  Parliament of Great Britain  was formed in 1707. Read also: My Ambition Is To Become a Collector