Monday, January 27, 2020
Literature Review Of Mph Bookstore Information Technology Essay
Literature Review Of Mph Bookstore Information Technology Essay For this section, it is all about the literature review on MPH bookstore with E-commerce system which is commonly used in today businesses network environment, their strengths and to achieve information on its history and how businessman operate their business with current architecture. The author will develop an E-commerce system for enchant the web login. 1.2 History of MPH Bookstore In 1815, MPH Bookstores has originally roots when William Milne, a young pioneer, starts a lasting mission enter in Malacca. The establishment migrated to Singapore when 1890 with the environmental objective of printing literature. During 1906, the organization change into the Methodist Publishing House. In 1927, it was formed into a legal corporation as Malaya Publishing House after it became a public listed company. According to the notification of the Malaysian nation in 1963, the company moved its name to Malaysia Publishing House with new bookstores were available in Malaysia (Penang, Malacca and Kuala Lumpur). To the public, Malaysia Publishing House as known as MPH. In 1972, Jack Chia from Hong Kong acquired MPH. However, MPH became known as Jack Chia-MPH Ltd. In March 2000, current Company changed its name into MPH Ltd in March 2000 to throw back the different in its majority ownership since 1998. MPH Bookstores Sdn Bhd was 100% owned by MPH Group Pte Ltd which in turn was a controlled by a holding of MPH Ltd, the public company revealed on the stock exchange of Singapore. In 2002, Malaysian company owned MPH Bookstores (S) Pte Ltd, Jalinan Inspirasi Sdn Bhd, which is part of a large Malaysian conglomerate owned by Malaysian businessman Tan Sri Syed Mokhtar Al-Bukhary. However, MPH becomes a entirely Malaysian-owned company. As the MPH group (Jalinan Inspirasi) to throw back its core businesses and it now owns MPH Bookstores (Indonesia, Singapore and Malaysia), MPH Distributors (Singapore and Malaysia). (mphonline, 2009) 1.3 MPH Bookstores Business Operation Figure 1 this is example of MPH bookstores online On wholly MPH Bookstores website, the ways they implement their e-business are to allow the consumer can get the latest book with cheaper prices and free delivery services. To register as their memberships, consumer can register directly through the official website. The site contains a shopping cart, order from listing products or services selected and credit card payment. At the same time, to make it become more attractive, they offered consumer may get the latest release books, cheaper prices for online transactions, and on the spot view the catalogue or information. With e-commerce system that provided by MPH bookstores, consumers will now have the ability to enjoy their services in better way. The prices displayed from the official website were no different with physical bookstores. For the delivery stage, for West Malaysia delivery it takes from 3 to 5 business days, for East Malaysia it takes within 14days and also available for globally. If the consumers received the books were damaged, MPH bookstore policy allows for a refund. However, the policy requires that the damaged book be returned to the following address within 7 days from the date of receipt of the book. Besides that, the objectives of this business operation are cause visitors to come to a place or participate in a venture by offering something of interest or advantage. If the MPH bookstore runs out of stock, consumers can order book from MPH online for Rm4 postage, if order above RM80 it will free delivery. 1.3.1 What should consumers do if they forget their password? Consumers require clicking on the Forget Password option, and then enter in your user Id and password. You will be prompted for an answer to the question of your choice. Once the answer is justified, the forgotten password will be displayed on the website. 1.3.2 What are the standard browser versions? MPH bookstores online is preferred with Internet Explorer 6.0 and above. Technology infrastructure for E-business system E-business infrastructure is vital to all companies adopting e-business. The infrastructure directly affects the quality of service experienced of users of the systems in terms of speed and responsiveness. E-business infrastructure refers to the combination of hardware such as servers and client PC in an organization, the network used to link this hardware and the software applications used to deliver services to workers within the e-business and also to its partners and customers. Infrastructure also includes the architecture of the networks, hardware and software and where it is located. Finally, infrastructure can also be considers to include the date and documents accessed through e-business applications. Introduction of E-commerce Now we are survive in an eagerness age of human innovation, where only one generation can witness very great shifts in technology and way of life. E-commerce not only just big, is also major refer to selling, services and buying products over internet or computer networks. Millions of companies that selling products to other companies have bring out that the Web not only provides a 24hours services and show that their products can reach a quick way to reach the right people in a company for the complete detail.(Ecommerce Definition,2006) 2.1.1 The E-commerce marketplace In this section we look at how electronic communications have changed relationships between the different participants of commercial transactions. Since the nature of these changes according to whether the transaction is between business and consumer or between businesses (inter-organizational, we start by reviewing differences between these types of transactions. We then look at how the channel structures of organizations have been changed through the process of disintermediation and reinter mediation. Locations for trading and mechanisms of commercial exchange in the electronic marketplace are then reviewed. Management terms have difficult decisions to take about which of these new models of trading is relevant to them, so we questioning approach, looking at some examples that have worked and some that havent it. 2.1.2 Benefits of Ecommerce Ecommerce enables people to go in businesses without the longer movement of time or distance. E-commerce systems can operate all day every day, once consumers access to the Internet at any point of time whenever day or night and purchase or sell anything one desires through the mouse clicking. The internet braces the world market through web businesses operate is the global market and wide. However it is possible to run business with any business or people who are connected to the Internet. For simple local businesses, as specialist record stores are enabling to market and selling using e-commerce. This is the current global opportunity is attend to the fact, different from traditional communications methods, users are not allow to charged according to the distance over which they are communicating. 2.2 Identify the e-business development Nowadays, as we discovered on Electronic business, it play a major role in the current worlds economy. Business development is a combination of marketing, strategic analysis, trade, regular occupation and sales. To perform your organization and business development being successful and greater is reliant on better knowledge of management theories and regular practice. Business development professional occupation is typically to identify new business opportunities whether that means latest markets, partnerships with other businesses, proper ways to reach existing markets, and product or service offerings to better meet the needs of existing markets and then to go out and make full use of those opportunities to bring in more revenue. Business development professionals are able to connect in everything to the development of their employers services and products. (E-business development, 2003) 2.3 Study on the innovations of e-commerce system The maturation ubiquity of current information technology is enabling the development of advanced services which consumers can access with existing devices such as computers or mobile phones. One of the innovations of e-commerce has affected the way people buy goods, services, choice, convenience and cost. Consumers may wish to give their own impressions of such sites, but better grades may be secured where further research is carried out, for example consumer surveys. It may also be possible to gain an insight into the benefits of using such websites through contact with e-commerce businesses. Second, consumers should be encourages to use the correct technical terminology in all the brief reports or descriptions produced for this unit. It is expected that higher grade consumers will use the correct terminology in their reports and will also produce more considered reports rather than one example of a benefit and/or limitation as would be expected for pass consumers. 2.4 Management Innovation Strategies in E-commerce Era When goes into the Era of e-commerce, business enterprises have several different features. To receive full benefits of e-commerce, enterprises should bring out appropriate management innovations. Enterprise innovation management allow helping enterprises to achieve great rate development to win over business opportunities and get opportunity to approach into markets and obtain higher profits. This stage is to investigate the new requirements on enterprise management through an e-commerce era, including occurring continuously updating thoughts of business management, flat organizational structure, management epitaxial expansion, informationization of means of production and marketing, flexible production management. Facts reveals that the business process reengineering, organizational development, creativity, cultural transformation, skill management and communication management have serious impinge on the enterprise development in terms of management and innovation. (Management Inno vation Strategies in E-commerce Era, 2008) E-Commerce Strategies The most importance ecommerce strategy is to enforce a proper secure E-commerce website. The appropriate way to achieve this is to protect the websites with security protocols and digital certificates. Major clients are attracted to ecommerce sites because of the good security and transaction mechanism. With ecommerce web site certified from the leading online security agencies is one of good way to promote E-commerce and supply the mechanism more authenticity and the quality of being trusted. Besides that, ensure that control the ecommerce operational specifications are brought out promptly tables and the databases are developed using programming language skills which display down all the data entry in a queue. Maintaining the record of the entire transactions which are brought out using the ecommerce mechanism can help the system to track all the complete details in more convenient and timely manner. E-commerce site design also plays an important role in its effectiveness. The interface of E-commerce sites is generally design to be user friendly and easily operational by the consumers so that they can make the online transaction more convenient or easily and in a manner which is very clear to the clients. Make the research on the existing websites Study on existing website with security enhancements Figure 2.1 this is one of the security enhancements that what Digi company had implemented. To key in username and password must through provided clicking the button provided. Figure 2.2 this figure show the second example of security enhancements. The figure 2.1 and 2.2 given on the top is the some part of the website of Lelong and Digi company in Malaysia how they operation their businesses.Lelong.com users can use standard or secure mode in security position. For the Digi company, they design a simple virtual keyboard on the registration webpage to avoid the data keyed by user can be protected from malicious key logger a harmful application which has been designed to capture keystrokes. Security enhancements developed for to prevent intruders go into certain network or user account to store media to view or retrieve the client information. With different security features implemented, users might attract with those security development. 3.2 Investigate the Security Issue 3.3 Digital Signatures and Certificates A digital signature is a common a way to enable that an electronic document (e-mail, spreadsheet or text file, etc.) is authentic. Authentic refer to that you know who created the document and know that it has not been changed in any way since that person created it. Digital signatures bound on several types of encryption to enable the authentication. Encryption is the process of data taken of computer, when sending to another computer and encoding it into a form that only the destination computer will be able to decode. Authentication is to process of ensure that information is coming from a trusted source. There are several ways to authenticate a person or information on a computer: Password The function of username and password provide the most usual method of authentication. Users can key in their name and password when prompted by the computer. It checks the username and password against a secure file to confirm. If either the username or password does not match with default registered, then users are not allowed further access. Checksum Possible only one of the origin methods of ensuring that data is accurate, checksums will provide a form of authentication when the wrong checksum suggests that the data has been compromised. The checksum is remaining in one of two ways. Assume the checksum of packet is around 1 byte long, which means that it can provide a maximum value of 255. If either the sum in other bytes in the packet is 255 or less then, then the checksum will contains that exact value. Yet if the sum of other bytes is more than 255, so the checksum is the remainder of the total value after it has been divided by 256. The example given for following page: Byte 1 Byte 2 Byte 3 Byte 4 Byte 5 Byte 6 Byte 7 Byte 8 Total Checksum 212 232 54 135 244 15 179 80 1151 127 1151 divided by 256 equals 4.496 (round to 4) Multiply 4 X 256 which equals 1024 1151 minus 1024 equals 127 3.4 Digital certificates To enforce the public key encryption on a large scale, such as a secure Web server might need, requires a different approach. This is where digital certificates come in. A digital certificate is basically a bit of information that says the Web server is trusted by self-reliant source as known as a Certificate Authority. The Certificate Authority pretends as the agent that both computers trust. It ensures that each computer is in fact who they say they are and then provides the public keys for each computer. 3.5 Secure Socket Layers (SSL) In network environment, SSL stands for Secure Sockets Layer. SSL is a protocol that developed for sending information securely over the Internet. Many websites use SSL for secure for their sites, such as user account pages and online checkout. Usually, when you are asked to log on on a website, the consequent page is secured by SSL. SSL encrypts the data being transmitted so that a third party cannot retrieve while the transmission and view the data being transmitted. Only the administrator and the secure server are able to recognize the data. SSL help to keeps information such like name, address, and credit card between users and merchant to which users are providing it. Without this kind of protocol, online shopping would be far too insecure to be practical. When you view a Web address starting with http or https indicates the website is secure. These websites frequent using SSL certificates to verify their authenticity. 3.6 Virtual Keyboard for Web Interface Figure 3 this is the layout of virtual keyboard A virtual keyboard development is to increase the security for those users had their own user account for several E-commerce services website by entering the username and password. Besides that, the virtual keyboard login is an applicationà in which a data entry layout will change once the page is refreshed. In general, virtual keyboard can help protect from malicious Spywares and Trojan Programs designed to capture keystrokes. Consequently, you can reduce risk of use and allow secure and safer authentication. Chapter 4: System Analysis 4.1 Fact-Finding Fact-finding is the method that used for the system developers to collect the information from groups or individuals. In this method, the analyst sits face to face with peoples and records their feedback or responses. As the interviewer, they can clear and cross check the doubts there itself by collected information with accurate and reliable. Through the fact-finding, it would make their business requirements such as good underà standing of the organization and its business objectives. 4.2 User requirement 4.2.1 System Administrator The duty of system administrator usually plays an important role to managing the information, installing, updating, supporting and maintaining serves for computer systems. For this section, the proposed system administrator is responsible to manage the books information, tag prices and quantity arrangement for consumers. Input /Modify the control Administrator allows change the information, uploading the photo or catalogue, updating and responding to service outages and other problems. Maintaining the server performance and efficiency. Output The catalogue, book titles, prices, and information will show. Process Processing the Storage Locate the information of books ,CD or DVD or prices in the database Performance None 4.2.2 MPH bookstores consumers The consumers will frequently enter the MPH bookstores official websites to view the latest updates and informations such as promotion or new release. The reason why of MPH launched this online shopping or e-business is to make their consumers shopping with more convenient way. Input Click on the option and it will automatically add to the cart. Output Login Username and Password/ forgot your password option. The proposed system will display the appropriate information of the books once the consumers had selected through the options that available on website interface. Process The book information or prices label will get directly from the database. Control None Performance None Chapter 5.0 Choose on appropriate tools or software 5.1Overview For this chapter, the author had review on available tools on the internet is performed in order to select suitable tools to be used to develop the system. 5.2 Study on available development software. 5.2.1 Java Figure 4.1 this is interface of java programming language Java is a high-level programming language that developed by Sun Microsystems. Java was originally called OAK, it was develop for several proposes such like handheld devices and set-top boxes. Oak was unsuccessful so in 1995 Sun changed the name to Java and modified the language to take benefits of the burgeoning World Wide Web. Java is an object-oriented language which is similar to C++, but simplified to get rid of language features that cause common programming errors. Java source code files (a .java extension) are compiled into a format called byte code (files with a .class extension), which can then be performed by a Java interpreter. Compiled Java code can execute on most computers because Java interpreters and runtime environments, known as Java Virtual Machines (VM), available for major operating systems, including Windows OS, the Macintosh OS, and UNIX/LINUX. Byte code able to converted directly into machine language instructions by using just-in-time compiler (JIT). In general, the purpose of java programming language with a number of features those make the language suitable for use on the World Wide Web. Small Java applications are called Java applets and able downloaded from a Web server and execute your computer by a Java-compatible Web browser, such as Microsoft Internet Explorer, Mozilla Firefox and Netscape Navigator. 5.2.2 ASP.NETà Figure 4.2 this is interface of asp.net programming language ASP.NET, the next version of ASP, is a programming framework used to create enterprise-class Web Applications. These applications are accessible on a global basis leading to efficient information management. Microsoft has been continuously working to shift its focus from Windows-based platforms to the Internet. As a result, Microsoft introduced ASP (Active Server Pages) in November 1996. ASP offered the efficiency of ISAPI applications along with a new level of simplicity that made it easy to understand and use. However, ASP script was an interpreted script and essentiallyà unstructured code and was difficult to debug and maintain.à The web contain many different technologies, software integration for Web development was complicated and required to understand many different technologies. An application grew bigger in size and became more complex, the number of lines ofà source code in ASP applications increasedà attractive and was difficult to maintain.à Therefore, the arch itecture was needed that would allow development of Web applications in a structured and consistent way. (Asp.net, 2004) 5.2.3 Visual Basic.Netà Figure 4.3 this is interface of visual basic.net programming language Microsoft-created object-oriented programming language as known as Visual Basic.NET which combines features of Microsofts .NET Framework and Web Services, such as SOAP, which is originally, developed using XML. Visual Basic.NET, which thought would be a sequel to Visual Basic 6.0, has a totally different language core. There is no backward or forward compatibility between Visual Basic 6.0 projects and code and Visual Basic.NET projects and code. Visual Basic.NET is a language developed to create .NET applications, Windows or Web applications, and Web Services. (Visual Basic, 2006) 5.3 Comparison on Java, Asp.net and Visual Basic Java Advantages In general, advantages of Java are platform-independent: One of the most significant advantages of Java is its ability to move easily from one computer system to another. The ability to run the same program on many different systems is crucial to World Wide Web software, and Java succeeds at this by being platform-independent at both the source and binary levels. Java is distributed: Distributed computing involves several computers on a network working together. Java is designed to make distributed computing easy with the networking capability that is inherently integrated into it. Disadvantages For the performance, Java can be perceived as significantly slower and more memory-consuming than natively compiled languages such as C or C++. Java is predominantly a single-paradigm language. However, with the addition of static imports in Java 5.0 the procedural paradigm is better accommodated than in earlier versions of Java and default interface and feel of GUI design is too complicated. ASP.NETà Advantages The latest set of controls that are able to use in the same way with HTML control like Calendars controls. It will execute without the requirement of ActiveX Control and without bringing up issues of Browser compatibility. ASP .NET Server take over the Controls that have an object model from the traditional HTML and provide single set of properties and methods that can make the change of the outlook and behavior of the controls and reduces the amount of code required to build huge applications. Disadvantages The control of Asp.net coding is inbuilt with the web server controls so users have no much of direct control on these controls. Visual Basic Advantages For the visual basic language, its simple language. Some program that might be difficult to program with other language can be done in Visual Basic very easily. It is because Visual Basic is so popular; beginner can find the answers to your programming problems much more easily than other programming languages. Disadvantages The disadvantages of Visual Basic are powerful language, but its not suit for programming really sophisticated games and slower than other languages. 5.4 Study on available data management software Microsoft SQL Server 2008 SQL Server 2008 delivers on Microsofts Data Platform vision by helping any organization to manage data, place, and time management. It provides can store data from structured, semi-structured, and unstructured documents, such as images and rich media, directly within the database. SQL Server 2008 hand over a rich set of integrated services that enable you to do more with your data such as query, search, synchronize, report, and analyze. SQL Server 2008 provides the highest levels and advanced of security, reliability, and scalability for your applications. To take newer advantage of new opportunities in today is fast-moving into business world, companies need the capacity to create and deploy data-driven solutions quickly. SQL Server 2008 is reduces time management, cost of management and development of applications. SQL server 2008 is able to access the data from your enterprise and provide control over your data, no matter where its stored from the largest servers within the data center to desktops to mobile devices. SQL Server 2008 provides a comprehensive platform that delivers intelligence where your users want it. For the Information workers can access data directly using the tools they use every day, such as the Microsoft Office system that provide by Microsoft. (MicrosoftSqlServer2008, 2010) 5.5 The chosen software to be used for the proposed system The author selects Microsoft SQL Server 2008 as the database management system and Visual basic language design for web interface. It is because SQL Server 2008 provides the common function by helping manage the data, place and time and Visual Basic is easier to learn and popular compare with other language such as (Java or C++ ) and yet it is enough powerful programming language to develop certain system. SQL provides the highest levels of security, reliability and scalability. In other way, the reason why the author chosen the Microsoft SQL Server 2008 is because it has the ability to support with the system which means that be able to connect with Visual Basic language tool that has been chosen as the development tool or software for proposed system. REFERENCES (BACKGROUND READING MATERIALS): MPH Bookstores Sdn Bhd, 2009, MPHonline, online, cited on 13th Jan 2010. Available from: http://www.mphonline.com/welcome/welcome.aspx MPH online, 2009, About the MPH, online, cited on 15th Jan 2010.Available from: http://www.mphonline.com/help/aboutus.aspx Mariosalexandrou, 2010 E-commerce definition, online , cited on 20th Jan 2010.Available from: http://www.mariosalexandrou.com/definition/ecommerce.asp Freetutes, 2008 Learn Visual Basic online, cited 15th Feb 2010. Available from http://visualbasic.freetutes.com/ Techterms, 2010 ASP.Net online, cited 17th Feb 2010. Available from http://www.techterms.com/definition/aspnet Java,2010 Definition of Java ,cited 13th Feb 2010. Available from http://www.pcmag.com/encyclopedia_term/0,2542,t=Javai=45557,00.asp Microsoft, 2010 Microsoft SQL Server 2008, cited 14th Feb 2010. Available from http://blogs.technet.com/dataplatforminsider/archive/2008/01/25/microsoft-sql-server-2008-roadmap-clarification.aspx. Digi, 2010 Online Customer Service, cited 22th Feb 2010. Available from https://www.digi.com.my/sso/try_login?v=1pid=2pssid=379e2d9011216b706f93f84247ce3e88baca7d3150cd33bfdb5f6c01e0699d4dprid=19a30572366f1c0df3b4cea76759a1afpurl=https%3A%2F%2Fwww.digi.com.my%2Focs%2Fmyaccount%2Fmain%2Fhome.do%3Fssologin%3Dtruecurl=http%3A%2F%2Fwww.digi.com.my ***END OF REPORT***
Sunday, January 19, 2020
Are Government Attempts to Control Population Ineffective? Essay
Today, keeping control of the population is a huge issue that is on all of the world leaderââ¬â¢s minds. The amount of people you have in your country is hugely important to whether you have enough resources, jobs, food, education, health services etc. It is mandatory that governments keep a track of the population and keep a lid on it if necessary. Many countries have implemented schemes, laws and policies that have tried to change the population demographic for the better of the country. I am going to discuss whether these policies have been effective in their job in controlling population, or not. In China 1979, a famous policy was instigated by Deng Xiaoping that limited married couples to have only one child. It was the ââ¬ËOne-Child Policyââ¬â¢. The reasons for its introduction were that previous to Deng, Mao Zedong had encouraged large families to increase productivity. The birth rate in 1970 was 33.43, so Deng knew something had to be done otherwise they would be seeing mass starvation for everyone by the end of the 20th century if the birth rate continued to rise. They introduced many incentives to give people more of a motivation to have fewer children: â⬠¢5-10% salary bonus for limiting to one child â⬠¢Priority in housing, education and health care for ââ¬Ëonlyââ¬â¢ children â⬠¢Higher pensions on retirement for limiting to one child Many sanctions were also introduced if the policy was not stuck to: â⬠¢10% salary reduction for having two children â⬠¢No extra space allocation for having two children â⬠¢Couples have to apply for the right to have children The One-Child Policy seemed originally like a hopefully effective plan, but there were many fundamental flaws that the Chinese government did not think through. For example it plays unfair against the different classes. They did not take into account that rural families need more farm hands and they usually have more children because of this. They paid fines for having more children, which were paid to the rich urban couples who, due to their busy lives, stopped reproducing at the one-child limit anyway. Also, boys were invaluable to rural families as they were strong and would eventually provide for their elderly parents when they grew up. Girls on the other hand were unwanted as they were less strong and would provide for their husbandââ¬â¢s family; not her own elderly parents. This caused a huge gender imbalance because sexism against girls began and many young couples purposefully starved or killed their baby girls to have another ââ¬Ëchanceââ¬â¢ for a boy. This means that now there is an unbalanced ratio of boys to girls; 12: 10. This makes it hard for men to find partners and there are many incidents of forced marriages, prostitution and kidnapping as women have become a commodity. There were many procedures done alongside the One-Child Policy to help decrease the fertility rate. They were effective but extremely brutal and inhumane; forced abortions were carried out on a massive scale. Unwilling women were thrown in cells and tortured until they admitted to having an abortion. In 1983 alone 16 million abortions were conducted- that is 44000 abortions a day. Additionally, many couples were sterilised which denied them of their reproductive rights. There were high numbers of infanticide; many children (mainly girls) were abandoned by their parents and were taken into orphanages. Yet these orphanages were seriously undermanned because of the fail to see the increase in abandoned children. The children often suffered tragically as the carers had little knowledge of childcare- 9 out of every 10 children died within one year of being admitted. Furthermore, skulls of infants were being crushed or injected with lethal medicine to place a cap on population growth. Doctors faced demotions, salary cuts or dismissal if they did not comply. These procedures were one of the worst human rights violations that happened related to the policy. The policy did bring success however, as it prevented 400 million additional births which would have placed a monumental burden on the population and government. The lower population has been beneficial to the environment and there are more resources to go around. Children in urban areas have received much better education and more attention and there will therefore be many talented intellectuals emerging from the population in twenty years. It has changed a country with high birth rates, low death rates and high natural increase to a country with low birth rates, low death rates and low natural increase. It has therefore continued through the stages of the Demographic Transition Model and is now almost at stage 4 of the model. Maternal and infant mortality rates have reduced and the average life expectancy has increased. Should the policy be continued, Chinaââ¬â¢s population will eventually peak at around 1.5 billion in around 2050, there will be more food and resources to go around, and literary rates will be at ââ¬ËWesternââ¬â¢ standards. Also the falling growth rate is estimated to level out and stable as a gentle, manageable natural increase. Nevertheless, today the unforeseen social problems of the poorly planned policy are revealing themselves to the world. There was a tragic disregard for human rights and life during the time when the policy was at its strictest. The worry now is for the future working generations because between 1949 and 1988 Chinaââ¬â¢s population almost doubled and these people are now of child-bearing age and by the 2030s will start to enter the over 60s category. There will be an ageing demographic. This will create a very high dependency ratio and put strain on the working people. The future economic consequences are uncertain due to the rapid rate of growth of Chinaââ¬â¢s economy. This case study should have showed how there are positives and negatives to a national population policy that is implemented suddenly into a country. To answer the question succinctly, no, government policies are not ineffective because they work at reducing birth rate, decreasing fertility and controlling the inhabitants of the country, but itââ¬â¢s the social and ethical impacts and consequences that need evaluating. I personally think that it worked in reducing population growth but the human cost may have far succeeded the supposed benefit due to the large loss of life that should not have been lost and the denial of many basic human rights. Also you may have to take into account that this policy was forced upon the Chinese people by their own government and it was their own leaders that allowed all the monstrosities like abortion and infanticide to take place. Therefore to put concisely, methods of the government to control the population are effective for their simple use but in my view I think that they need to be planned expertly and seriously thought through otherwise a huge unwanted loss of life can occur.
Saturday, January 11, 2020
Lanval Sir Gawain research paper
The legendary works of Lanval and Sir Gawain provides a positive human state of loyalty and honor that will truly boost the persona of these two individuals. Different portrayal of roles which will lead to a channel of similarities and differences was the focal point of scrutinizing these two masterpieces. In addition, upon exploring these two different works considering the positive and / or negative human state, attitude and characteristics, it is imperative to determine the strengths of Lanval and Sir Gawain by using these criteria.The story of Lanval reverses the typical conventions in romance as the maiden rescues the knight instead of the usual approach that men took the first move. In the event wherein Lanval walk away going nowhere, he looses his mind with and unfortunately his horse did not make to serve him and no other way but Lanval let go of his horse Apparently there were ladies along the way who came across with whom presents great attitude of accommodating him. As thi s two ladies approach Lanval, there was a prior intention of leading Lanval to the queen.à à à In Marie de Franceââ¬â¢sà Lanval ââ¬Å"These two ladies came straightaway / To the place where Lanval lay / Lanval, mannerly, well-bred / quickly scrambled to his feet / The ladies spoke, first to greet / Him, then with a message they said / Lord Lanval, the lady we owe duty / A lady of valor, wisdom and beauty / Itââ¬â¢s for you our lady has sent / Us.Now come along with us, do! / Safely weââ¬â¢ll conduct you through / Not far ââ¬â look, you can see her tent!â⬠(6.1-12). Despite the eagerness of the queen to establish a discreet relationship, Lanval in return cannot take the pleasure being offered to him, thus, he neglected to pursue such tempting emotion. ââ¬Å"For her kiss, her embrace, her touch / Little he cares about otherââ¬â¢s delight / When he canââ¬â¢t enjoy his own! / The queen saw him go off alone / And she headed straight for that knight / S he sat near him, she called him over / she spoke as her heart would move her / Lanval, I really so respect you / I really care, I really love / And you can have all my love / Tell me what you want! I expect you / Must be happy at what I say / Iââ¬â¢m offering to go all the way / Lady, he said, let me go! / I never thought to love you so! / Iââ¬â¢ve served the king for many a day / His faith in me I wonââ¬â¢t betray / Not for you, your love, or anything / Would I ever act against my king!â⬠(13.1-19).It came to the point that the queen became desperate for the reason that Lanval still hold his emotion and stay in being loyal. Out of which the queen claims that Lanval maltreated her and even come to the point that Lanval was put in trial because of the anger of Queen Guinevere. ââ¬Å"The King had just come home from the wood / His day's hunting had been good / He went into the Queen's chamber / She cried out, loud, when first she / Saw him, fell at his feet, begged merc y / Accused Lanvalââ¬âhe had shamed her! / He'd asked her for a love-affair / She'd said no, with this result / He'd offered her an ugly insult / He boasted of a friend so fair / So full of pride, breeding, honor / That the chambermaid who waited on her / The lowliest, poorest of the poor / Compared to the Queen, was worth far more / The King was angry, to the core / His oath against Lanval he swore / In court he'd prove he was no liar / Or else he'd hang, or die by fire / The King left the Queen's bedroom / Called three of his barons to him / Sent them to bring in Lanvalâ⬠(15.1-21).On the other hand, the story of Sir Gawain and the Green Knights epitomize the attitude of having a word of honor but unfortunately in the case of Sir Gawain, he did not make it up to the end. The game is that the challenger gets a chance to hit the Green Knight but in a year and a day, he must go to the Green Knight's chapel and then the Green Knight will test him and if he fails the tests, th e Green Knight will hit him. Sir Gawain being the youngest knight in the round table unfolds the challenge of battling with the Green Knight and continue with the pact that goes with the confront which was after a year of the fight the conqueror will go to Green Chapel to get a blow in return if he does not meet the ordeal.As Sir Gawain was on his way to the said place after a year, he was able to meet Bertilak. ââ¬Å"Sir, if you be Gawain, it seems a great wonder / A man so well-meaning, and mannerly disposed / And cannot act in company as courtesy bidsâ⬠(lines 1126 ââ¬â 1997). à As Sir Gawain reached the place, challenges were headed for him, which in fact was very symbolic in nature. Temptations occurs which in turn he get hold of a girdle. Bertilak which happens to be the Green Knight also put him into the test as they come to the exchange of winnings. Unfortunately, Sir Gawain fails to be loyal and honest as he fails to utter the girdle that he has.Both these stori es present exciting analytical relationship taking into account honor and courtly love. It is of great pride of the characterââ¬â¢s portrayal on how their outlook will affect their decisions up to the end which will make them a hero of their own. Compare and contrast these two poems is the focal point of this paper. In addition, at the end of this paper, identifying the similarities and differences of both works was essential in the analysis of the subject matter.Compare and Contrast: Lanval & Sir GawainLoyalty was clearly illustrated in both characters. It is of great value to take note how this certain attitude transform their individuality. Lanval promises not to reveal the identity of his mistress. Even when Queen Guinevere attempts to seduce Lanval, he refuses temptation because of her loyalty to his lover ââ¬â the fairy maiden. Evidently, the foundation of such loyalty was rooted in the character of his lover. On the other hand, Sir Gawain takes the challenge for King A rthur in response to his loyalty to his master. He also honors the pact of one year and one day and took the chance of fighting with beast in order to render the pact of their duel. Sir Gawain has the will to sacrifice in order to hold on his word to the point that he almost experience starving just to keep his promise.In lieu of their loyalty, they established within themselves the honor which gives them the pride. Lanval embrace his word up to the end even if he goes through a trial, he faces it with pride and honor. He did not endure the accusations of the queen and faces its challenges. On the other note, Sir Gawain seize his honor as he dwell on the challenges of the concordat up to the end. He did not even open a single door to have second thought to pursue the battle with the Green Knight and thus, give him ultimate honor.As regards to feelings, both the character of Lanval and Sir Gawain experienced to have intense love ââ¬â the one for a certain maiden and the latter wa s a love for the self. It could be different in criteria but both give them the strength to live. The pursuance of ones love ultimately gives them the drive to stand rigid and hold on what would make them tough. Definitely, as the character of Lanval and Sir Gawain defeats temptation, this love boosts their grip on the road to being strong.à It brightens the lives of Lanval and Sir Gawain as their powerful love bestow them hope. Lanval even if heââ¬â¢s on trial and in any moment will destroy the life that he has, he consistently hold onto the hope that the truth will prevail ââ¬â whatever accusations of the queen towards Lanval, it will not persist because it just present an opaque scenario of events which did not occur in the first place. à In Marie de Franceââ¬â¢s Lanval ââ¬Å"On the day set for the trial / The barons have traveled many a mile / To be there; the Queenââ¬â¢s there, and the King / And now Lanvalââ¬â¢s hostages bring / Him in. Theyââ¬â¢re so s orry for him / A hundred knights or more, I guess / Would have done anything for him / So he could walk free away from the case / So wrongful are the accusations!â⬠(20.1-9).The people will stand for Lanval as they witness the unreasonable accusations that queen bequeath on Lanval. Parallel to this, as to the case of Sir Gawain, as he faces the challenge of the Green Knight, his will sustains his hope. The more he pursues the pact, the more it will give him peace of mind. Thus holding on the aspiration of victory gives him hope.Guilt also took part in the characters stance and make plausible comparison. As regard to Lanvalââ¬â¢s encounter with the queen, even if he was very much aware that the personality of the queen might be ruin, Lanval still insist with his determination to stand to what he believes is right ââ¬â and that is to be loyal with his lover. As to the story of Sir Gawain and the Green Knight, in consequence of Sir Gawainââ¬â¢s encounter with challenges in Greenââ¬â¢s Chapel, the host gives him kisses in return for his success, however he did not follow to what they agreed prior the battle, he did not give all of his winnings which gives him the guilt and thus consistently wear the girdle around his arm as a sign of his culpability.ConclusionThe act of sincerity comes into account as we weigh the guilt which was instill in the hearts and minds of the characters. Both Lanval and Sir Gawain were sincere in their craft. With no hesitance, they face the consequences of their chosen field. Fear was the major hindrance to their established characters.Both personas disregard pleasure and pain. The act of cynicism was present in Lanval and Sir Gawain. Courtly love was taken into account in these two characters. Lanval epitomized his sincerity and love for his fairy maiden as he kept surpassing the barriers of their relationships. On the other hand the host going to the Green Chapel touches the heart of Sir Gawain in one way or the other as he sealed himself in exchanging his winnings with the Green Knight specifically with the girdle that he got from the host. Sense of mortality was present as it has a feeling of commonality in both presented poems. These nearly pass the same life cycle as its main character being portrayed by Lanval and Sir Gawain almost has the same channel ââ¬â a sense of preciousness of time and life.Good things happen to good people. Lanval broke his promise, and Sir Gawain broke his promise. But nothing bad happened to either. They learned from their mistake and they were regretful. Both authors show that after all, humans will be humans, and humans are capable of mistakes, no matter how honorable their past has been.Both the female characters are not loyal to their husbands. Neither is Queen Guinevere or the hostââ¬â¢s wife. Both try to seduce another man and attempt to sleep with other man. Men are more loyal than women in these two works.On another note, there were also opposing in stances in these poems. The works differ in loyalty. Sir Gawain lied to protect his life while Lanval lied to protect his mistressââ¬â¢ honor. Furthermore, as regards to the sense of guilt, Lanval did not felt a single guilt at the end as he chose to stand firm on what he believe was right. Lanval just ride off to Avalon with his lover ââ¬â as if it was okay for him to break his code of silence. On the Contrary, there was a feeling of guilt in Sir Gawain since he was not honest in exchanging his winnings and in consequence of his remorse; he wears his girdle in his arms.Lanval and Sir Gawain show the interconnection of their stories as well as their temperaments. In one way or the other, there was resemblance with their stories and it presents a good basis of comparison.Referencesââ¬Å"LANVALâ⬠Marie de France, translated Judith P. Shoaf à ©1991, 2005Stone, Brian. Sir Gawain and the Green Knight. British Library. 1974
Thursday, January 2, 2020
Battle of Belmont in the Civil War
The Battle of Belmont was fought on November 7, 1861, during the American Civil War (1861 to 1865). Armies Commanders Union Brigadier General Ulysses S. Grant3,114 men Confederate Brigadier General Gideon Pillowapprox. 5,000 men Background During the opening stages of the Civil War, the critical border state of Kentucky declared its neutrality and announced it would align opposite the first side that violated its borders. This occurred on September 3, 1861, when Confederate forces under Major General Leonidas Polk occupied Columbus, KY. Perched along a series of bluffs overlooking the Mississippi River, the Confederate position at Columbus was quickly fortified and soon mounted a large number of heavy guns which commanded the river. In response, the commander of the District of Southeast Missouri, Brigadier General Ulysses S. Grant, dispatched forces under Brigadier General Charles F. Smith to occupy Paducah, KY on the Ohio River. Based at Cairo, IL, at the confluence of the Mississippi and Ohio Rivers, Grant was eager to strike south against Columbus. Though he began requesting permission to attack in September, he received no orders from his superior, Major General John C. Frà ©mont. In early November, Grant elected to move against the small Confederate garrison at Belmont, MO, located across the Mississippi from Columbus. Moving South To support the operation, Grant directed Smith to move southwest from Paducah as a diversion and Colonel Richard Oglesby, whose forces were in southeast Missouri, to march to New Madrid. Embarking on the night of November 6, 1861, Grants men sailed south aboard steamers escorted by the gunboats USS Tyler and USS Lexington. Consisting of four Illinois regiments, one Iowa regiment, two companies of cavalry, and six guns, Grants command numbered over 3,000 and was divided into two brigades led by Brigadier General John A. McClernand and Colonel Henry Dougherty. Around 11:00 PM, the Union flotilla halted for the night along the Kentucky shore. Resuming their advance in the morning, Grants men reached Hunters Landing, approximately three miles north of Belmont, around 8:00 AM and began disembarking. Learning of the Union landing, Polk instructed Brigadier General Gideon Pillow to cross the river with four Tennessee regiments to reinforce Colonel James Tappans command at Camp Johnston near Belmont. Sending out cavalry scouts, Tappan deployed the bulk of his men to the northwest blocking the road from Hunters Landing. The Armies Clash Around 9:00 AM, Pillow and the reinforcements began arriving increasing Confederate strength to around 2,700 men. Pushing forward skirmishers, Pillow formed his main defensive line northwest of the camp along with a low rise in a cornfield. Marching south, Grants men cleared the road of obstructions and drove back the enemy skirmishers. Forming for battle in a wood, his troops pressed forward and were forced to cross a small marsh before engaging Pillows men. As the Union troops emerged from the trees, the fighting began in earnest. For around an hour, both sides sought to gain an advantage, with the Confederates holding their position. Around noon, the Union artillery finally reached the field after struggling through the wooded and marshy terrain. Opening fire, it began to turn the battle and Pillows troops began falling back. Pressing their attacks, the Union troops slowly advanced with forces working around the Confederate left. Soon Pillows forces were effectively pressed back to the defenses at Camp Johnston with Union troops pinning them against the river. Mounting a final assault, the Union troops surged into the camp and drove the enemy into sheltered positions along the riverbank. Having taken the camp, discipline among the raw Union soldiers evaporated as they began plundering the camp and celebrating their victory. Describing his men as demoralized from their victory, Grant quickly grew concerned as he saw Pillows men slipping north into the woods and Confederate reinforcements crossing the river. These were two additional regiments which had been sent by Polk to aid in the fighting. The Union Escape Eager to restore order and having accomplished the objective of the raid, he ordered the camp set on fire. This action along with shelling from the Confederate guns at Columbus quickly shook the Union troops from their reverie. Falling into formation, the Union troops began departing Camp Johnston. To the north, the first Confederate reinforcements were landing. These were followed by Brigadier General Benjamin Cheatham who had been dispatched to rally the survivors. Once these men had landed, Polk crossed with two more regiments. Advancing through the woods, Cheathams men ran into straight into Doughertys right flank. While Doughertys men were under heavy fire, McClernands found Confederate troops blocking the Hunters Farm road. Effectively surrounded, many Union soldiers wished to surrender. Not willing to give in, Grant announced that we had cut our way in and could cut our way out just as well. Directing his men accordingly, they soon shattered the Confederate position astride the road and conducted a fighting retreat back to Hunters Landing. While his men boarded the transports under fire, Grant moved alone to check on his rearguard and assess the enemys progress. In doing so, he ran into a large Confederate force and barely escaped. Racing back the landing, he found that the transports were departing. Seeing Grant, one of the steamers extended a plank, allowing the general and his horse to dash aboard. Aftermath Union losses for the Battle of Belmont numbered 120 killed, 383 wounded, and 104 captured/missing. In the fighting, Polks command lost 105 killed, 419 wounded, and 117 captured/missing. Though Grant had achieved his objective of destroying the camp, the Confederates claimed Belmont as a victory. Small relative to the conflicts latter battles, Belmont provided valuable fighting experience for Grant and his men. A formidable position, the Confederate batteries at Columbus were abandoned in early 1862 after Grant outflanked them by capturing Fort Henry on the Tennessee River and Fort Donelson on the Cumberland River.
Subscribe to:
Comments (Atom)