Wednesday, July 31, 2019

Examining Social Structure Theory Essay

For the purpose of this paper in examining theories, I have chosen to view the Tent City, AZ video. â€Å"Located in the desert near downtown Phoenix, Tent City houses 2,000 inmates in canvas tents† (Films Media Group, 2007). Conditions are difficult for the inmates, and since there are no prison bars, maintaining control over the inmates is a constant concern for the guards (Films Media Group, 2007). I will show that the content of the video should be appropriately acknowledged as well as studied using a social structure theoretical application. I will review the social disorganization theory, the strain theory, and the culture conflict theory, and how they supported the social structure theory in relation to Tent City. I will identify the primary subjects of the video, and the social issues that are raised for the inmates in the Tent City facility. Additionally, I will examine the major principles of sociological theories and the ramifications of social process change. Letâ €™s begin with an explanation of the social structure theory and some examples from the video that supports these theories. Supporting Social Structure Theory In watching the Tent City video, it is apparent that it follows the social structure theory. The subcultures that are created by dividing the inmates into racial groups comes with some protection for the inmates from those in their racial group, but this protection can come with a price (Films Media Group, 2007). According to the text, there are three major types of theories that support the social structure theories. They include the social disorganization theory, strain theory, and culture conflict theory (Schmalleger, 2012, â€Å"Social Structures Theories/Types of Social Structure Theories†). The text goes on to explain that the â€Å"Social disorganization theory (which depicts social change, social conflict and lack of social  consensus as the root causes of crime and deviance)† (Schmalleger, 2012, â€Å"Social Structures Theories/Social Disorganization Theory†). The strain theory is defined â€Å"as the pressure that individuals feel to reach socially d etermined goals† (Schmalleger, 2012, â€Å"Social Structures Theories/Strain Theory†). The culture conflict theory â€Å"suggests that the root cause of criminality can be found in a clash of values between differently socialized groups over what is acceptable or proper behavior† (Schmalleger, 2012, â€Å"Social Structures Theories/Culture Conflict Theory†). The social disorganization theory, the strain theory, and the culture conflict theory are supported in this video by the following examples. The social disorganization theory is supported in the Tent City video by the segregation of inmates being housed with their same racial group. This causes the groups to stick to themselves for reasons of safety and protection from other racial groups and gives each group a sense of belonging and fitting in. The inmates are expected to follow the rules that include avoidance of involvement with contraband. The contraband is used by the inmates to get things such as money, commissary items, and power or status within their racial group as well as to the other racial groups. The strain theory is supported in the video because the restrictions of inmate belongings are enormous. The inmates are deprived of many things including condiments, tobacco, drugs, and anything that can be used to construct weapons. The inmates are subjected to frequent but random searches by the guards and the Special Response Team (SRT). They are often stripped down to their under ware during the searches, which gives the inmates negative feelings, and reduces their self-esteem as they are forced to cower to the guards. Additionally, the restrictions put strain on the inmates, causing some to disobey the rules, which puts them in a position of acting deviant to gain the things they desire. While, to some degree the inmates must depend on other inmates for safety, protection, and contraband items, they each know that they are on their own. The culture conflict theory is supported in the video in the aspect of racial segregation. This causes power and status struggles between the racial groups as they are struggling to survive their incarceration while attempting to maintain some form of self-worth. Primary Subject of Video The primary subject of this video is keeping control of the facility with the use of zero tolerance policies for the inmates of Tent City. It focuses on a new inmate named Ryan Merlina, who was â€Å"convicted of forgery, burglary, and most recently, possession of methamphetamine† (Films Media Group, 2007). Merlina, who has a long history of drug use and has been in and out of the juvenile system for a considerable amount of his teen years, at age nineteen came to Tent City, an adult facility (Films Media Group, 2007). In addition to the videos depiction of the circumstances faced by staff and inmates, it chronicles Merlinas’ personal struggles with his journey through incarceration at Tent City. On an Internet video, Films Media Group (2007) states that, the court offered Merlina a reduced sentence in exchange for him pleading guilty. â€Å"If he behaves himself, he’ll serve just six months at Tent City. But if he messes up, he’ll get 12 years in state prison† (Films Media Group, 2007). At Tent City, the inmates are not allowed to have certain things such as sugar, tobacco, drugs, and weapons. The prison system employs the Special Response Team (SRT), who conducts random and frequent searches to stay ahead of the inmate’s attempts to control and distribute contraband items. This is done to catch the inmates off guard, seize contraband, and find out who is responsible for the contraband, and hold that inmate accountable through punishments such as solitary confinement and in some cases the implementation of maximum sentences (Films Media Group, 2007). In a setting such as the one of Tent City, the inmates face social issues of their confinement. Social Issues Raised The social issues raised in the video relate to the subcultures created within the Tent City facility. The inmates are separated into racial groups. The newly arriving inmates are assigned to a tent that they share with twenty-one other inmates, all who are felons (Films Media Group, 2007). According to the video one guard stated, â€Å"Unfortunately, everything out here is organized by race. And when a new inmates comes into our system, they’ll be approached by someone from their race who will explain to them what the rules and expectations are out here† (Films Media Group, 2007). â€Å"Rule number one, stick to your own race. Each group has its own seating area and name† (Films Media Group, 2007). Because the inmates stick with their own racial group, this creates social issues amongst all inmates. â€Å"The groups claim  they exist to provide protection. Officers say their purpose is controlling inmates and contraband† (Films Media Group, 2007). Each racial group has leaders that generally involve themselves in contraband. It becomes a struggle for the inmates to try to control contraband while also trying to stay under the radar of the guards. â€Å"In this hostile environment, tensions run high and chaos is always just around the corner† (Films Media Group, 2007). New inmates quickly learn that, â€Å"sometimes it’s not a rival group inmates have to worry about, it’s their own† (Films Media Groups, 2007). â€Å"The DOs have ways of turning us against each other if we mess up. That’s their way of punishing us. They’ll make you look like a bad guy and get your tent tossed on you. Then it’s going to make everybody in your tent mad at you† (Films Media Group, 2007). For those inmates that break the rules of their group, they suffer punishments that are swift and painful (Films Media Group, 2007). The punishment for minor infractions such as a verbal insult will result in a punch in the jaw, but for major ones, such as not paying a debt, the inmate will receive a beating by three or more inmates of their racial group (Films Media Group, 2007). Due to the social issues tha t arise from incarceration, principles of the sociological theories are evident. Major Principles of Sociological Theory According to the text, social structure â€Å"theories look at the formal and informal economic and social arrangements (or structure) of society as the root causes of crime and deviance† (Schmalleger, 2012, â€Å"Social Structures Theories/Definition of Social Structure Theories†). In addition, the social structure theories look at the negative aspects of society’s structure, such as disorganization, poverty, and disadvantages associated with lack of educational success as the cause of criminal behavior (Schmalleger, 2012, â€Å"Social Structures Theories/Definition of Social Structure Theories†). The major principles of the sociological theory that are addressed in the video are Tent City’s social group arrangements of society that provides focus for study, group dynamics and subgroup relationships from which crime develops, society’s structure and degree of organization/disorganization, and specific behaviors that can statistically estimat e characteristics to engage in crime. The social groups formed in Tent City are racially motivated, meaning that each inmate is segregated to their own racial group to keep the  different racial groups separated from each other. The group dynamics in a population of criminals that are divided into subgroups by race offers two examples the major principles. One example relates to the group being made up of all criminals, and the second example relates to the racially segregated subgroups that keep the inmates with their own race. This can lead to struggles related to status amongst their own racial group, and to the other racial groups. Society’s structure, being a prison that is run under zero tolerance rules (organization), and the conflicting disorganization of the inmates and their desire for obtaining contraband, while they struggle to complete their sentence without getting into trouble. Additionally, the specific behaviors that each inmate possesses that brought them to commit crimes that resulted in their incarceration is a major principle of sociological theories. Criminal behaviors by individuals, grouped with the criminal behaviors of the other inmates, can be a cause for additional criminal behavior. Possible Ramifications for Social Process Change While integrating the inmates together and removing the racially segregated groups may seem like the appropriate thing to do, there are possible ramifications of changes in their social processes that need to be addressed. For the inmates, these racially segregated groups offer some form of protection. By removing the built in sense of protection, it can cause additional stress and anxiety for the inmates. The inmates are deprived of many â€Å"luxuries†, and tend to look to their fellow inmates to receive some creature comforts of home. Although the inmates can only depend on themselves, the racially segregated groups offer the inmates a sense of support by belonging to a group. Removing that element can open the door for cultural clashes. According to the text, the â€Å"Social process theories draw their explanatory power from the process of interaction between individuals and society† (Schmalleger, 2012, â€Å"Theories of Social Process and Social Development/The S ocial Process Perspective†). Social process changes within the Tent City facility can weaken the inmates established social bonds, which could result in them turning on each other because of different cultural practices and beliefs. According to the text, criminal behaviors are learned through the interaction with others  (Schmalleger, 2012, â€Å"Theories of Social Process and Social Development/The Social Process Perspective†). And social process â€Å"is seen as the primary route through which learning occurs† (Schmalleger, 2012, â€Å"Theories of Social Process and Social Development/Summary†). If changes are to be made, they have to be enacted in society during a person’s learning process, only then can it make positive change. Conclusion As you can see, the content of the video should be appropriately acknowledged and studied using a social structure theoretical application. I have shown how the subcultures created by dividing the inmates into racial groups comes with some protection for the inmates from those in their racial group, but this protection comes with a price (Films Media Group, 2007). The three major types of theories that support the social structure theories include the social disorganization theory, strain theory, and culture conflict theory. All of these theories are supported in the video by the conditions and circumstances presented to the inmates of Tent City both current and in the past. The primary subjects addressed in the video include the zero tolerance practices of the guards and its focus on the inmate named Ryan Merlina. For Merlina, it’s a daily struggle to do his time quickly by avoiding deviant behavior while for the guards it’s a constant struggle to maintain control over the inmates. This leads to how the social structure theories look at the negative aspects of society’s structure like disorganization, poverty, and disadvantages that cause criminal behavior (Schmalleger, 2012, â€Å"Social Structures Theories/Definition of Social Structure Theories†). The ramifications for social policy change discussed show that any changes to the current situational practices of the Tent City facility would cause problems for the inmates, and possibly create cultural clashes amongst the inmates. Since the inmates are deprived of â€Å"luxuries† and comforts, they depend on the friendships of other inmates for support and protection. By removing a built in sense of protection, it can cause additional stress and anxiety for the inmates. While it is obvious that the inmates can only depend on themselves, the racially segregated groups do offer the inmates a sense of belonging. To conclude, it is apparent to me that this video does provide some important facto rs that can be appropriately acknowledged and studied using a social structure theoretical  application. References Films Media Group (2007). Lockdown: Tent City [Video file]. Retrieved from Films on Demand website: http://digital.films.com/PortalPlaylists.aspx?aid=7967&xtid=40796 Schmalleger, F. (2012). Criminology Today: An Integrative Introduction (6th ed.). Retrieved from The University of Phoenix eBook Collection Database

Dekalb County School System teaching Essay

Fourteen years in the Dekalb County School System teaching special education makes Dr. Monica ReVonda Ellerbe a strong believer in the value of parents’ involvement in the education of their children, especially in the elementary years. â€Å"The home has to be an extension of school, in a way that parents have to be aware of what their children are being taught on a daily basis, so there would be less discipline referrals on the part of their teachers,† Ellerbe says. Her doctorate in Education, Curriculum and Instruction from Argosy University in Sarasota, Florida was secured after having formalized and documented how learning in some American schools is made more effective due to the intervention of students’ parents, since such familial attention can address discipline concerns. Ellerbe, who obtained a bachelor’s degree in Psychology from Saint Augustine’s College in North Carolina and an M. A. in Behavioral Disorders from the Clark Atlanta University, also believes that parents’ and teachers’ role is not only to provide knowledge to children, but to point out opportunities for them to develop themselves. Parents, after all, are students’ first and lifelong teachers. As the mother of Chandler Myers Ellerbe, the daughter of loving parents John and Dorothy, and an education specialist, Monica definitely walks the talk. â€Å"Even with several feathers in my cap, my role in the family is what I most take pride in,† she says. â€Å"But I think my knowledge in education permeates in all aspects of my life. † As a holistic educator, however, Ellerbe does not limit her academic interests in behavior and parental involvement. She has also received certifications in ESOL endorsement, gifted endorsement, language arts, mathematics and social science. She is also involved in several professional organizations namely Delta Sigma Theta Sorority, National Education Association (NEA), Georgia Association of Educators (GAE), Organization of Dekalb Educators (ODE), Georgia Association of Gifted Children (GAGC) and Teachers of English to Speakers of Other Languages (TESOL). #

Tuesday, July 30, 2019

Creative writing Essay

‘Now this is a story all about me, when my life got twist turn upside down, if you like to take a minute just reading right here, I’ll write you how I became a prince of a town called New Jersey’ could you find a word that rhymes with New Jersey? ‘In East London I’m born and raised on a playground is where I’ve spent the most of my days chilling out, relaxing all cool and all kicking some football outside of school when a couple of guys, they were up to no good started making trouble in my neighbourhood I got in one little fight and my mum got scared and said â€Å"you’re moving with your aunt and uncle in New Jersey here, have this Hershey’ that kind of rhymes. If you didn’t know Hershey is a chocolate bar that is sold in America. Although I would like to think that I was the fresh prince, my story didn’t exactly start out like that. Instead of my parents sending me to my relatives because of academic problems, I went because I have been nagging them for a really long time. I’m not saying that my academic level was reaching its fullest potential before I went, but the main reason I went was to have a taste of things to come. For as long as I can remember I have always wanted to live in one of those semi-detached American houses with the large front garden, golden retriever, two kids and a large garage. When most people watch American films they are focused on the storyline, but when I watch them not only am I watching the story, but also at the back of my mind I am constantly absorbing the American background. Finally in the summer of 2000 July 3rd, I got the chance to have a taste of my dream. Even though it was just a small taste, it was enough to last me however long it will take to finally move there. When my parents did decide that it was o. k. to send me there, it was there idea of making me have a taste of the ‘real world’. There idea of a taste of the ‘real world’ was my idea of a taste of a dream. At the time I had just finished my GCSE’s, and my grades were not that great. My parents had planned that America would change my course; I guess it did in the end but my biggest change was with my personality. When I did return I felt more confident, independent, funny and larger (thanks to those large American portions of food). Everything leading up to the day I left flew by and before I knew it I was in the airport sitting at the waiting room with my dad. I remember my dad being really calm and cool about everything, he never really got sad in front of me especially with good-by’s. He told me stories about when he went to New York for the first time: ‘Now this is a story all about your dad, back in the day I also was bad, Your old man also had the American dream, thinking that it would be so cool and supreme, I stayed there for a while to learn the truth, that America was best lived in the movies, ‘what a poof! ‘ I never knew my dad could rap, looks as though he has a problem with finishing it as well. To sum up my dads rap; he also had the American dream being brought up on James Dean movies. Throughout his teenage years he had dreamt up an image of what America would be like, unfortunately when he stayed there, it did not match his dream. That is how my dad tells the story, but I think there’s something he is not telling me. I also believe that my parents don’t want me to live far away from them because they regret moving far away from their parents when they were younger. On the plane, I sat next to an empty seat, which wasn’t bad as I wasn’t really good with the airplane conversations. I travelled on Virgin Atlantic and the in-flight entertainment was great, they had a video screen in front of each seat with which I could play games, watch films and programmes. Anyway back onto America, I remember as we approached the New York coast I heard a passenger in the seat in front of me, â€Å"look there’s the statue of liberty† I looked to my right out of the window and saw her. She was a bit smaller then I had imagined (in Ghostbusters 2 she was huge! ), and she was green. I never actually realised that she was green before; I always thought she was grey. I wasn’t disappointed though; looking at the New York skyline for the first time was great. However I still felt as though I was in England, maybe it would change when we land. After I collected my luggage, I went through the inspection terminal where policemen checked your passports. I found this strange but the strangest was to come, when I reached the gate where my aunt would be waiting for me. Oh yeah if I didn’t mention it before, I would be staying with my auntie there, like my parents were really going to let me stay there by myself. Anyway along with the story, the last time I saw my aunt was when she visited England when I was 2 so†¦ I was the first out into the arrival room and there was a crowd so large I felt like I was in one of those ‘where’s Wally’ books. I looked at the crowd and then a man taped my shoulder and pointed out my aunt to me. They were waving out to me trying to get my attention with a big sign with my name on it. I said thanks to the first American I made contact with and walked over to them. We did the usually Portuguese custom and did the kiss on the cheeks thing. I originally thought that communication between us would be easy, but boy did I wish I brought my translator. They could barely understand me, and the fact that my ears were still popped from the plane journey didn’t help either. I felt like a deaf, posh Wally (as in Where’s Wally). The next day when I woke up, I had that weird feeling when I wake up in a different room and don’t know where I am (it was like that film Memento). Then I got up and looked at the picture of ‘the statue of liberty’ on the desk and remembered when I was on the plane. I woke up to Independence Day and before I knew it I was on my way to a barbecue. It was a beautiful sunny day and boy was it hot! I wore light cloths but it was way hotter then I thought it would be. When I arrived there I met ‘The Martins’, they suited the typical average American household family everything apart from the golden retriever. Not that my aunt and uncle didn’t suit the typical American household image, but they lived in an apartment which was more like an episode of ‘Friends’. At the barbecue I ‘piged’ out big time, I don’t think I have ever eaten so much in such a small time. I even got to drink my first bottle of Budweiser, I never really liked beer but after that I had chosen my favourite drink. I had also bonded really well with Bruno Martin and his friend Chris. Bruno showed me his loft that he lived in under his house; he had his own shower, living room. After the barbecue we went for a drive in the city, on my second day I was already in New York. We drove around for a while, but there was too much traffic so we had to stop and park near the Brooklyn Bridge (it was in the end of ‘Godzilla’). From there we watched the fireworks, there were lots of people that were watching with us. After that we finally drove into the city and walked around in ‘Time Square’ (too many films too mention). I have never seen so many people from different countries in one place. That night I slept well knowing that when I wake up tomorrow I will definitely know where I am. A couple of weeks later I went out with Bruno and Chris again for a whole day out. First up was a visit to his high school, where we would play baseball on the field. I was looking forward to seeing what his school looked like, after all those years of seeing a typical American high school in TV programmes. It was huge and the sports facilities were expensive. They had a huge football field (as in American football), and three outdoor tennis courts! It made the sports facilities back at my school look basic. We played baseball on the field, which is when I began to really feel American. Bruno and Chris were impressed with my skills, especially as I had hit more home runs then both of them. After that we went to the beach, which is when I began to feel as though I was David Hassolhof in an episode of Bay watch. The weeks generally flew by, however there were some bad weeks when things were just going all wrong. When my aunt leaves for work each morning she would leave something that I could pop in the microwave. I however was not to sure on the rules of using a microwave and used a non-microwave plastic container to re-heat some chicken from the night before. I was just watching TV eagerly anticipating my meal, when I smelt smoke. I rushed into the kitchen; smoke was everywhere, opened the microwave and saw that the container had melted with the chicken inside it! I threw it into the bin opened all the windows and turned the A/C to full power. I went for the air conditioner, hoping that I could diminish the smell of burnt plastic. When my aunt returned from work she could smell the burnt plastic straight away but thought that maybe the dogs litter tray needed to be cleaned out. I actually thought that I might get away with it until my mum realised the burn stain in the microwave, DUM DUM DUMM (that was meant to be when in movies when something bad happens). She caught and shouted at me for having both the windows open and the A/C on. If you think that was bad, that is nothing compared to when I was taking Pepper (our dog) for a walk and a huge dog attacked him. That was really scary, the owner of the big scary dog, couldn’t even release his own dog. The dogs jaws were looked tightly on Pepper’s neck all I could was watch. Luckily Pepper survived and was treated for minor bite wounds. Towards the end of my visit my vacation began to look up greatly. I visited New York more often and went on the Statue of Liberty and on the World Trade Centres. I remember when I went to the twin towers the tour guide on the lift told us that the lift was travelling at 30 mph (or something like that) and I could feel my feet feel light as we got closer to the top. The top three floors were accessible to tourists including the roof. To get to the roof you would take a escalator, all you could see when you were going up was bright blue sky and I felt as though when the escalator reached the top I would go over the edge. When I finally plucked up the courage to get on the roof the view was beautiful. You could see for miles, all the wonders of New York were in view from one place. When I returned showing my photos from the roof, my friends thought that I was on a helicopter. On my visit to the big green woman, I actually realised clearly how large she was up-close. I thought about how long she has been there for, everything she would have seen. Throughout seeing all the sites a common image would occur to me of re-visiting these sites when I move to America. For me New York was a place to visit not to live in. I have always wanted to live in the house from Home Alone, which is set in Chicago. I have always like the Christmassy look. Returning back to England was weird as when I went to America. Once again no-body could understand me (by now I have an American accent), I had to get use to the money as well. The weird thing about America is that when you get use to it you don’t even realise that you are living in America. Although you are use to it, you still notice differences here and there. My American dream is still there, its just a matter of until I make it into reality.

Monday, July 29, 2019

Responses to blogs that I will put below Article

Responses to blogs that I will put below - Article Example While it is a great idea to implement such a law, I am skeptical that people would like to actively participate in the effective implementation of such a law until they find certain incentives in doing that. I think that such a law can be made more effective by developing a lottery scheme in which, people who have generated more material for recycling compared to others should be entitled to some rewards. It is up to the government to establish the minimum limit for such a competition and the rewards. In addition, government also needs to create awareness among the public on the benefits of recycling through tv programs and other forms of media so that people understand the importance of recycling and fulfill their responsibility toward the nation. Enforcing stricter punishments to discourage the act of littering is a very effective strategy to minimize littering. Punishment and fines are what people really care about and tend to avoid, and can thus be forced to deter from littering. However, in addition to implementing this law, an additional thing that the concerned authorities can do to decrease the amount of litter is installation of more trash bins. There is no doubt that there are a lot of trash bins everywhere in the US, but still if people are littering, this means that no matter how many of them have been installed, they are still not enough. People certainly need more trash bins to prefer using them on littering. Nobody would like to litter if a trash bin is in approach. In addition to this, government should introduce a scheme according to which people that have collected maximum litter throughout the year should be rewarded. It is up to the government to establish way of finding this out as there can be plenty of w ays. The law you have proposed serves to safeguard just one animal in particular whereas the medicinal benefits obtained provides health

Sunday, July 28, 2019

Noble Savages of 18th-20th Century and their relation to Puritan & Essay

Noble Savages of 18th-20th Century and their relation to Puritan & Quaker ideas about Native Americans - Essay Example Noble Savages of 18th-20th Century and their relation to Puritan & Quaker ideas about Native Americans According to Bryan R.Wilson, author of ‘The Noble Savages: The Primitive Origins of Charisma and Its Contemporary Survival’, the noble salvage believes in the existence of God in that it is inborn and exists within us rather than being an outside external power. It is innate. The concept of noble savage has become popular because it follows the concepts of being honest and of being a neutral but moral human being who believes in ethics yet is not as involved in religion or politics as the Puritans whose number one priority by all means was to follow religion. Puritans believed that this world is just a part of life and does not remain forever. They believed that Native Americans are people who believe in worldly pleasures which are not permanent. However the truth is that in today’s world, this is the kind of life which is very lucrative and seems practical for most people- on the path of righteousness in a worldly way with a lot of flexibility like those of noble salvages who were not considered pious in medieval times. Stelio Cro suggests that the beliefs of the noble savages were very impressive for many people who began following them, in his book ‘The Noble Savage: Allegory of Freedom’, which is a detailed analysis of the life of these noble savages and how they became so popular. They confessed that they had strong faith in liberty and freedom of speech and expression, in prudence and liberalism, in health and well-being- not only for themselves but for the greater world. They were strong believers of close ties with family and friends and were great advocates of fairness and equitable distribution of resources. They were followers of courage and had the confidence to speak the truth, stay on the right path, be nice to others, accept and respect diversity, and ultimately bring peace to this world. They were against the concept of fighting and war and had made it clear that humanity was more important to them than anyone else. In itself, these beliefs were strong enough attracts a h uge amount of people towards them from the other extreme of Puritanism and Quaker Ideas. Puritans were in essence the opposites of noble savages who were aggressive, Protestants, critical and extremists who were highly ethnocentric and would consider themselves as superior. They were of the view that worldly matters are just a matter of time before they vanish and do not matter anymore. During the period when the renaissance was coming to an end and enlightenment was underway in Britain and France as well, the ideology of noble savages had become very lucrative and attractive for people who were moving out of the dark ages and were becoming modernized, educated and enlightened. In the eyes of Robert J. Miller who very well described the noble savage ideology in his book ‘Native America, Discovered And Conquered: Thomas Jefferson, Lewis & Clark, And Manifest Destiny’ said that the noble savage concepts seem to have bought with it an array of hope and light of social revi val, peace and harmony to the world for which they were gaining importance and Puritans were losing control and popularity both because their focus was more towards religion than towards humanity and they were considered to be primitive in nature no that the Enlightenment was in process and people wished to move towards more humanitarian

Saturday, July 27, 2019

PAE Organization Culture Exercise Assignment Example | Topics and Well Written Essays - 500 words

PAE Organization Culture Exercise - Assignment Example Members have learned the attributes of sharing whatever they have with others and it has since become a tradition to give to other people. The organization has existed for many years and children born to parents in the organization end up sharing the aspiration of the organization. In turn, they learn the virtues of the organization and end up being part and parcel of the organization. In this regard, the kindness and compassion are the most evident dominant virtues of the organization. Despite the differences that people have, since they come from different families and places, they all have common goals and aspirations that have become part of the culture. For example, children are born and adapt to the practices of the community. By the time they mature they learn the attributes and join others in ensuring the goals of the organization are met. Due to the culture of the group, which has been passed to different generations, members have become accustomed to the practices of the group and that is now part of them. The cultural practices of the group are founded from Christian doctrines. Christianity calls for following in the footstep of Jesus and that means that all members are supposed to emulate Jesus. Even though the entire church is supposed to share in the practice of Christianity, out welfare organization has gone a step further to share the true values of Christianity by helping the less fortunate people. Despite the dominant culture, as advocated for in the values of the organization, members have their own unique (cultures) ways which sometimes conflict with the dominant cultures. For example, there are some instances when members can conflict with each there and in worse situation verbal exchanges take place. These occasionally arise due to the difference in cultures and personal issues. For example, when planning for events some members have problem keeping time. However due to the stringent requirements and

Friday, July 26, 2019

Developmental theories Essay Example | Topics and Well Written Essays - 1750 words

Developmental theories - Essay Example Each of the stages of development in Erikson's theory is a "sensitive phase" that represents the optimum time period within which to resolve a crisis (Slater & Bremner, 2003). Whether the resolution is positive or negative, the results function as the foundation of the next crisis period (Slater & Bremner, 2003). Middle childhood, was also termed the Latency stage by Erikson and occurred during the ages of 6-11 years (Slater & Bremner, 2003). The beginning of this period paralleled the concrete operational stage of cognitive development of Jean Piaget's (1952), where the child begins to conceptualise more systematically, can consider several factors of a situation at once (decentration), begins to classify and categorize, and can perform conservation (as cited in Austrian, 2002). The child must resolve the socio-emotional conflict of inferiority vs. accomplishment (Slater & Bremner, 2003). Children at this time are encouraged to work together on tasks and so the child compares their ability to create and achieve goals with the achievements met by their peers (Austrian, 2002). The significant others at this time, according to Erikson, will be peers at school and in their neighbourhood (Slater & Bremner, 2003). However, their social sphere in general is extending beyond their parents and famil y, to incorporate teachers and other members of the community with whom they are coming into more contact with (Slater & Bremner, 2003). As such, all these social beings contribute to the socio-emotional growth of the child (Slater & Bremner, 2003). Systematic instruction is required for the child during the latency stage, with the direct involvement of relevant role models critical to the child's development of a sense of industry (Coughlan & Welsh-Breetzke, 2002). Lev Vygotsky (1978) also emphasised the critical need for social interaction for development, although his theory focused on the social process of learning for cognitive development (as cited in Austrian, 2002). According to moral theory of Lawrence Kholberg (1970), middle childhood is a time of progressing from the stages of preconventional to conventional morality (as cited in Austrian, 2002). Hence, the opinions of social others become more important and the child's behaviour conforms to meet social norms (Austrian, 2 002).Erikson viewed the latency period as a developmental period where the child must learn to tame their imagination, and orient themselves towards learning the social norms of their culture, and of learning the educational requirements for their age (Slater & Bremner, 2003). The child continues to develop their sense of autonomy and independence as initiated in the

Thursday, July 25, 2019

Constitutional Research Paper Example | Topics and Well Written Essays - 3750 words

Constitutional - Research Paper Example However, it is observed that the Fourth Amendment has been a victim of different controversies and is regarded as an issue by the US Constitution making authorities and a few other elements. To address this issue, this paper aims to provide a clear explanation and solution. Moreover, to evidence and balance the theory, different federal statues and pending cases on the issue will also be discussed and highlighted. The paper will also discuss reasons for the growing controversies behind the chosen topic followed by a Social Policy and its implementation. Contextual Background to the Issue: The US citizens who have been a victim of the ‘freedom vs. security’ debate has suffered a lot. It has been possible because of the Fourth Amendment that the people can find themselves safe and that they will never be violated. Their security in the US society was assured and protected by this law in the US constitution (Gonzales, 2007). Background (Fourth Amendment): Due to the increas e in the Injunctions of Assistance and general warrants in the late 17th century many elements; citizens, authorities, and groups strongly objected the process and as a consequence the Fourth Amendment was written and compiled. ... 4th Amendment: â€Å"the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized†. It was before and without this law, that people felt insecure and did not have any assertion or right over property, security, or privacy. Incidents have been noticed in which Army Marshals and other officers have entered the homes and have taken different evidences which can be used for trial in the court or to help make an arrest (Fradin, 2007). However, a number of controversies have been noticed in the past few years, 4th amendment remains one of the strongest amendment from citizen point of view. The 4th Amendment was never appreciated by the FBI and other agencies working for the security of the State. The law had been bre ached in the Bush era and it is being violated again in the present era of President Obama. The Obama administration requested their supporters in the Congress to pass a legislation that will allow the federal agents to continue their search and march without any barrier and through the 4th Amendment. This is to ensure that they get all the private information of all the citizens residing in their country (Smith, 2010). The 4th Amendment which ensures the individual’s right to be left alone and with their security and privacy is again at stake by the Federal agents in the country. The officers want to make the system more easy and through for them so that they can gather digital information. It was witnessed and revealed in the past when the Bush government was exposed that they had been

Super Prison Project Management Essay Example | Topics and Well Written Essays - 2250 words

Super Prison Project Management - Essay Example The act of imprisonment or incarceration is a legal penalty possibly imposed by the state for a crime committed. The history of prisons dates back to the Biblical history of Joseph in Egypt. However, it began in the 19th century in Britain and has advanced to most countries in the World. In England and Wales, the history of prisons has been that prisoners are assigned security classes when sentenced, while all prisons are provided with specific security classifications depending on the prisoners’ types and numbers recommended (Alexander M., 2012). For instance, the classifications were into category A, B, C, and D. i. Category A: Meant for those whose escape from the prisons would most likely endanger the public and national security. ii. Category B: those of no serious/ maximum security needs, however for those who needed to be highly bared from escaping the prisons. iii. Category C: convicts who own no trust from the prison administrations in case they are left in the open c onditions, but are unlikely to make any escape attempts (Carlson M. and Garrett S, 1999). iv. Category D: convicts who can be reasonably trusted not to make any attempts of escaping from the prisons, and are hence provided with the privilege of an open prison. Such prisoners are subject to approval by the prison administrations and given Release On Temporary License to be able to work outside the prison and or leave for home upon passing their Full License Eligibility Date, which is usually a quarter of any sentence period (Ayers E. L., 1984). Super prison project is entitled to include among other things: religious facilities housing chaplaincy officers and other facilities for counseling; education facilities including library, with provision of adult education and continuing education opportunities; health facility; an exercise yard; a sally port; a segregation unit; a unit for vulnerable prisoners; safe cells; visiting area; a death raw; staff accommodation area; support facilit ies area; agriculture or industrial plant run with the convicts’ labor; a recreational area; and an administration area for prison management (Diiulio J., 1990). 2. Work Breakdown Structure This is a representation of the stakeholders’ roles in diagrammatic format (Harrison F. and Dennis L., 2004). Project management as a discipline involves planning, motivating, organizing and controlling the available resources so as to attain a specific goal; in this case the construction of the Super Prison (Young-Hoon Kwak, 2005). The stakeholders will therefore the managers of each department assigned to them. 3. Stakeholders A stakeholder is anyone involved in a project for the purpose of successful implementation of the project’s strategies. Effective implementation of this project requires composition of stakeholders who will be charged with the responsibility of foreseeing and supervising each and every activity that are undertaken (Dennis L., 2007). A number of stakeh olders, each assigned specific duties will have to demonstrate their potential in undertaking the proposed functions schedule for each rank in the project management. The stake holders will include: a. Executive Sponsor The Executive Sponsor of this Super Prison development and implementation project will be the government of England, and will have the responsibilities of: owning the project and funding it directly; being responsible for the project’s benefits; providing recommended resources and key Implementation Officers to the project in a timely manner; working very closely with the Project manager to deliver the expected benefits; chairing of the Steering Committee in case called upon; approving project initiation plan, statement of project scope, project plan, and any other changes to the set plan, scope or benefits;

Wednesday, July 24, 2019

IT metrics Essay Example | Topics and Well Written Essays - 750 words

IT metrics - Essay Example The economic value of IT to a company tends to depend on the particular business needs of the company under focus. Broadly speaking, IT tends to contribute to four major areas in nearly all businesses. These areas include the corporate market position and revenue generation; customer support for business operations; direct and indirect fiscal benefits such as cost savings; and investments in IT that enhance the business operations through value addition. Depending on the nature of the business in focus, it would be pertinent to measure the value of IT contribution accordingly. It has been suggested that IT’s contribution to economic value can be measured most effectively considering the absence of the relevant IT services to a business (Sliger & Broderick, 2008). The economic value of IT to a business can be measured best when considering what would happen if IT services and goods were removed. Although this may seem an extreme method of quantification, it provides the most re alistic scenario. In a similar manner, businesses should focus on areas that matter most - such as the delivery of goods to customers after booking. This allows businesses to see how IT adds to the baseline operations and lets the business realize in what way IT system would augment revenues best. The implementation of IS in a business operation is to ensure that security breaches are not able to affect the entire business operation negatively. Quantifying the returns provided by IS to a business operations environment may not be simple at all.... This allows businesses to see how IT adds to the baseline operations and lets the business realize in what way IT system would augment revenues best. IS Value Assessment Models The implementation of IS in a business operation is to ensure that security breaches are not able to affect the entire business operation negatively. Quantifying the returns provided by IS to a business operations environment may not be simple at all. On the one hand, there are businesses that are transacting secure information such as credit card numbers using IT; on the other hand, there are businesses that are doing little more than providing customer support online. Using similar methods to measure IS value addition for various businesses is highly unrealistic so various models are in place that depend in large part on the nature of the business in question. It is recommended that businesses define in detail what areas are to be valued most in terms of security. The reasons behind such value addition class ification should also be expounded based on value addition to business operations. Once such value addition areas have been specified, the next step should be to classify IS value addition (Tsiakis & Pekos, 2008). Applicability of Traditional Financial Ratios and Measurements Traditional financial ratios and measurements cannot be applied to IT and IS directly, but instead, they require some manipulation before they can be applied. It is pertinent to note that fiscal ratios and measurements are not fully applicable to a number of different IT and IS areas such as the provision of bandwidth, virus detection rates, etc. However, this does not indicate that fiscal ratios and

Tuesday, July 23, 2019

The Multi-unit manager Essay Example | Topics and Well Written Essays - 3750 words

The Multi-unit manager - Essay Example Practical and Implications – The knowledge obtained from this study will help the multi-unit restaurant operation in the development of Human resource in terms of recruitment, selection and training needs. Introduction In the United Kingdom, the service industry represented over 77.1 percent of Gross Domestic Production in 2010 (CAI Fact book, 2011). There are many international hotels such as Hiltons or Accor that have expanded all over the world. In restaurant sector, most restaurants seem to be a small business or family business, which has only one unit. After raising more profit, the business tends to expand its outlets to both national and overseas level. McDonald’s, for example, has expanded its branches, which are approximately 31,000 restaurants in 2010 (Ritzer 2011). Multi-unit restaurants could be defined as a company which rivals in the sector with more than one unit of a concept or theme (Olesen et al 1992). Due to intense competitiveness in the restaurant sector, cost reduction and standardization have been consistently focused on in multi-unit firms in order to get returns on investment of its brand (Jones 1993). In a chain of restaurants, â€Å"manager of managers† or the manager who operates between operations and cooperate level managers is called as the Multi-unit manager (Drucker 1995). According to Goss-Turner (1999), in a multi-unit firm or the multi-unit area responsible for 2 to15 units, the responsibilities of the Multi-unit managers are to concentrate on strategy of business rather than single unit operations. As a result of standardizations that have increased in nineteenth century, the multi-unit has grown along with systematic assessment for selection of training for the multi-unit manager (Goss-Turner 1999). It could be seen that with the intention of expanding in chain, multi restaurant outlets and the multi-unit area need to develop simultaneously. To gain a competitive advantage, the company should be able t o develop quality of their employees especially the multi-unit manager. It can be said that most of the academic study has focused on the role, responsibilities and skills of single-unit operation, but on the multi-unit company. The skills of the area manager are likely to be different from the single unit managers. Umbreit and Smith (1990) claimed that almost all the area managers are recruited from single units. Consequently, the multi-unit managers have faced problems in making the transition from single-units to multi-units because of the role, responsibility and skills that are different from single operation managers. Umbreit and Tomlin (1986) surveyed many multi-food services and highlighted that most functions of the multi-unit managers are related to restaurant operation, human resource, and finance. Subsequently, Muller and Campbell (1995) also showed that human resource was the most significant issue for the multi-unit managers. In addition, in 2009 human resource, restau rant operation and finance were still the major requirements for the multi-unit manager position. For these reasons, at the heart of this study is to analyze the roles, responsibilities and skills of the multi-unit managers in restaurant industry by providing a case study of Pan Asia group. A semi structure conducts interview of the multi-unit

Monday, July 22, 2019

Weintraub Essay Essay Example for Free

Weintraub Essay Essay Daniel Weintraub, in â€Å"The Battle against Fast Food Begins in the Home,† states that parents are responsible for the increasing epidemic of child obesity. In our world today, children sit around play video games all day, if they are allowed to. Weintraub argues that parents need to â€Å"step up to the plate† and get children involved in some type of exercise. I agree with Weintraub’s opinion that parents are responsible. If parents would start teaching kids early on, they could use that impressionable quality to their advantage. Parents have a lot of influences on their children from the day they are born. Weather they feed them healthy or unhealthy. Children learn how to talk respectfully, and how to respect their elders from parents. Not only should they learn that but parents should encourage them healthy eating habits. A parent should take the time of day to cook them healthy things instead of junk. They could make sure that a child receives a serving of fruits or vegetables at lunch and dinner to eliminate soda and all junk food from the house. At a young age, parents need to teach kids that there is more to life than just sitting around watching television or being on their electronics every day. Parents could introduce their children to different sports until the child finds one that he or she is interested in. For example my mother’s boss is teaching her daughter healthy eating habits. She comes home to make lunch so she can make sure that she is eating healthy. She always tells me that when you have well eating habits nothing can stop you from being healthy Conclusion to this is that the truth is that no child can grow up to be an intelligent human being without a proper education, whether it is in mathematics or eating habits. Fast food companies are always going to compete for customers and try to make money, but they cannot control our decisions. The only people that can make choices for us are ourselves, and we cannot make the right choices without proper education from our parents.

Sunday, July 21, 2019

Euphemism: Social Linguistic And Psychological Aspects

Euphemism: Social Linguistic And Psychological Aspects According the New Oxford Dictionary of English (Oxford University Press 2001) euphemism is a mild or indirect word or expression substituted for one considered to be too harsh or blunt when referring to something unpleasant or embarrassing. In the Wikipedia encyclopedia (February 2007), a euphemism is an expression intended by the speaker to be less offensive, disturbing, or troubling to the listener than the word phrase it replaces, or in the case of doublespeak to make it less troublesome for the speaker. When a phrase is used as a euphemism, it often becomes a metaphor whose literal meaning is dropped. Euphemism may be used to hide unpleasant or disturbing ideas, even when the literal term is not necessarily offensive. This type of euphemism is used in public relations and politics, where it is sometimes disparagingly called doublespeak. Sometimes, utilizing euphemisms is equated to politeness. There are superstitious euphemisms, based (consciously or subconsciously) on the idea that words have the power to bring bad fortune (for example, not saying the word cancer) and religious euphemisms, based on the idea that some words are sacred, or that some words are spiritually impelling. In Euphemism and Dysphemism: language used as a shield and weapon (1991), Allan and Burridge claimed that euphemism is characterized by avoidance language and evasive expression, speaker uses words as a protective shield against the anger or disapproval of natural or supernatural beings. It is an expression that seeks to avoid being offensive. But because our background relies on linguistics euphemism is not merely a response to taboo: it also functions where the speaker avoids using a distasteful expression and/ or an infelicitous style of addressing or naming. 2-Etymology: The word euphemism comes from the Greek word euphemos, meaning auspicious/good/fortunate speech/kind which in turn is derived from the Greek root-words eu (ÃŽÂ µÃƒ Ã¢â‚¬ ¦), good /well + pheme (à Ã¢â‚¬  ÃƒÅ½Ã‚ ®ÃƒÅ½Ã‚ ¼ÃƒÅ½Ã‚ ·) speech/speaking. The eupheme was originally a word or phrase used in place of a religious word or phrase that should not be spoken aloud; etymologically, the eupheme is the opposite of the blaspheme (evil-speaking). The primary example of taboo words requiring the use of an euphemism are the unspeakable names for a deity, such as Persephone, Hecate, Hemesis or Yahweh. By speaking only words favorable to the gods or spirits, the speaker attempted to procure good fortune by remaining in good favor with them. Historical linguistics has revealed traces of taboo deformations in many languages. Several are known to have occurred in Indo-European languages, including the original Proto-Indo-European words for bear (*rtkos), wolf (*wlkwos), and deer (originally, hart). In different Indo-European languages, each of these words has a difficult etymology because of taboo deformations a euphemism was substituted for the original, which no means honey eater. One example in English is donkey replacing the old Indo-European-derived word ass. In some languages of the Pacific, using the name of a deceased chief is a taboo. Amongst Australian Aboriginal people, it was forbidden to even use the name or the image of the deceased, so that today the Australian Broadcasting Commission publishes an apology to indigenous people for using names or images of people who have recently died. Since people are often named after everyday things, this leads to the swift development of euphemisms. These languages have a very high rate of vocabulary change. (Dyen, Isidore, A.T. James J.W.L. Cole. 1967. Language divergence and estimated word retention rate) The Euphemism Treadmill Euphemisms often evolve over time into taboo words themselves, through a process dubbed the euphemism treadmill by Steven Pinker. (cf. Greshams Law in economics, founded by Sir Thomas Gresham in 1566). This is the well-known linguistic process known as pejoration. Words originally intended as euphemisms may lose their euphemistic value, acquiring the negative connotation of their referents. In some cases, they may be used mockingly and become dysphemistic. For example, the term concentration camps, to describe camps used to house civilian prisoners, was used by the British during the Second Boer War, primarily because it sounded bland and inoffensive. However, after the Third Reich used the expression to describe its death camps, the term gained negative connotation. Since then, new terms have been invented for them, such as internment camps, resettlement camps, etc. Also, in some versions of English, toilet room, itself a euphemism, was replaced with bathroom and water closet, which were replaced respectively with restroom and W.C. Connotations easily change over time. Idiot, imbecile, and moron were once neutral terms for a person of toddler, preschool, and primary school mental ages, respectively. As with Greshams law (1566), negative connotations tend to crowd out neutral ones, so the word mentally retarded was pressed into service to replace them. As a result, new terms like mentally challenged or special have replaced retarded. A similar progression occurred with Lame à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ crippled à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ handicapped à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ disabled à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ differently-abled. Although in that case the meaning has also broadened (and hence has been narrowed with adjectives, which themselves have been euphemised); a dyslexic or colorblind person would not be termed crippled. In the early 1960s, Bill Veek, who was missing part of a leg, argued against the then-favored euphemism handicapped, saying he preferred rippled because it was merely descriptive and did not carry connotations of limiting ones capability the way handicapped (and all of its subsequent euphemisms) seemed to do. It can apply to naming of racial or ethnic groups as well, when proposed euphemisms become successively corrupted. George Carlin (Propaganda Critic: Word games à ¢Ã¢â€š ¬Ã‚ º Euphemisms, September 2002) gave a famous monologue of how he thought euphemisms can undermine appropriate attitudes towards serious issues such as the evolving terms describing the medical problem of the cumulative mental trauma of soldiers in high stress situations: Shell shock (World War I) à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ battle fatigue (World War II) à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ Operational exhaustion (Korean War) à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ (Vietnam War). He contended that, as the name of the condition became more complicated and seemingly arcane, sufferers of this condition have been taken less seriously as people with a serious illness, and were given poorer treatment as a result. In the same routine, he echoed Bill Veeks opinion that crippled was a perfectly valid term (and noted that early English translations of the Bible seemed to have no qualms about saying that Jesus healed the cripples). 3- Classification of euphemisms. (Wikipedia Encyclopedia, February2007) Many euphemisms fall into one or more of these categories: à ¢- ª Terms of foreign and/or technical origin (derrià ¨re, copulation, perspire, urinate, security breach, mierda de toro, prophylactic, feces occur ) à ¢- ª Abbreviations (SOB for son of a bitch, BS for bullshit, TS for tough shit, SOL for shit out of luck, BFD for big fucking deal) à ¢- ª Abbreviations using a phonetic alphabet (Charlie Foxtort for Cluster fuck, Whisky Tango Foxtort Oscar for What the fuck, over?, Bravo Sierra for bullshit) à ¢- ª Plays on abbreviations (barbecue sauce for bull shit, sugar honey ice tea for shit, Maryland farmer for motherfucker, catch (or see) you next Tuesday for cunt) à ¢- ª Use in most clinical settings (PITA PT for pain in the ass patient) à ¢- ª Indirections (behind, unmentionables, privates, live together, go to the bathroom, sleep together) à ¢- ª Mispronunciation (goldarnit, dadgummit, freaking) à ¢- ªLitotes (not exactly thin for fat, not completely truthful for lied, not unlike cheating for cheating) à ¢- ª Changing nouns to modifiers (makes her look slutty for is a slut, right-wing element for right-wing, of jewish persuasion for jew). There is some disagreement over whether certain terms are or are not euphemisms. For example, sometimes the phrase visually impaired is labeled as a politically correct euphemism for blind. However, visual impairment can be a broader term, including, for example, people who have partial sight in one eye, a group that would be excluded by the word blind. There are three antonyms of euphemism: dysphemism, cacophemism, and power word. The first can be either offensive or merely humorously deprecating with the second one generally used more often in the sense of something deliberately offensive. The last is used mainly in arguments to make a point seem more correct. 4-The evolution of euphemisms. Euphemisms may be formed in a number of ways. (Wikipedia Encyclopedia, February 2007) Periphrasis or circumlocution is one of the most common-to speak around a given word, implying it without saying it. Over time, circumlocutions become recognized as established euphemisms for particular words or ideas. To alter the pronunciation or spelling of a taboo word (such as a swear word) to form a euphemism is known as taboo deformation. There are an astonishing number of taboo deformations in English, of which many refer to the infamous four-letter words. In American English, words which are unacceptable on television, such as fuck, may be represented by deformations such as freak even in childrens cartoons. Some examples of Cockney rhyming slang may serve the same purpose-to call a person a berk sounds less offensive than to call him a cunt, though berk is short for Berkeley Hunt which rhymes with cunt. Bureaucracies such as the military and large corporations frequently spawn euphemisms of a more deliberate (and to some, more sinister) nature. Organizations coin doublespeak expressions to describe objectionable actions in terms that seem neutral or inoffensive. For example, a term used in the past for contamination by radioactive isotopes is Sunshine Units. Military organizations frequently do kill people, sometimes deliberately and sometimes by mistake; in doublespeak, the first may be called neutralizing the target and the second collateral damage. Violent destruction of non-state enemies may be referred to as pacification. Two common terms when a soldier is accidentally killed (buys the farm) by their own side are friendly fire or blue on blue (BOBbing) (Buy the farm has its own interesting history). Execution is an established euphemism referring to the act of putting a person to death, with or without judicial process. It originally referred to the execution, i.e. the carrying out, 3f a death warrant, which is an authorization to a sheriff, prison warden, or other official to put a named person to death. In legal usage, execution can still refer to the carrying out of other types of orders; for example, in U.S. legal usage, a writ of execution is a direction to enforce a civil money judgment by seizing property. Likewise, lethal injection itself may 3e considered a euphemism for putting the convict to death by poisoning. Industrial unpleasantness such as pollution may be toned down to outgassing or runoff- descriptions of physical processes rather than their damaging consequences. Some of this may simply be the application of precise technical terminology in the place of popular usage, but beyond precision, the advantage of technical terminology may be its lack of emotional undertones, the disadvantage being the lack of real-life context. 5-Euphemisms for the profane. (Wikipedia Encyclopedia, February 2007) Profane words and expressions in the English language are generally taken from three areas: religion, excretion, and sex. While profanities themselves have been around for centuries, their limited use in public and by the media has only slowly become socially acceptable, and there are still many expressions which cannot be used in polite conversation. The common marker of acceptability would appear to be use on prime-time television or in the presence of children. The word damn (and most other religious profanity in the English language) has lost its shock value, and as a consequence, euphemisms for it (e.g. dang, darn-it) have taken on a very stodgy feeling. Excretory profanity such as piss and shit may be acceptable in adult conversation (provided that they are used in a literal sense rather than a figurative sense), while euphemisms like Number One and Number Two are preferred for use with children. Most sexual terms and expressions, even technical ones, either remain unacceptable for general use or have undergone radical rehabilitation (penis and vagina, for instance). a- Religious euphemisms Euphemisms for God and Jesus are used by Christians to avoid taking the name of God in a vain oath, which would violate one of the Ten Commandments. When praying, Jews will typically use the word Adonai (my master). However, when in a colloquial setting, this is deemed inappropriate, and so typically one replaces the word Adonai with the word HaShem, which literally means, The Name. It is notable that Adonai is itself a word that refers to the Jewish Gods name, but is not the name itself. Traditionally, Jews have seen the name of God as ineffable and thus one that must not be spoken. Even in English, some religious Jews will write God as G-d, in imitation of most Hebrew writing which does not include vowels. Because of this, the name of God in ancient Hebrew writings is transliterated as JHVH, YHVH, or YHWH, the four letters collectively known as the tetragrammaton. The vowels of Gods spoken name are therefore unknown, though such pronunciations as Yahweh and Jehovah are common guess es. Euphemisms for hell, damnation, and the devil, on the other hand, are often used to avoid invoking the power of the adversary. b- Excretory euphemisms While urinate and defecate are not euphemisms, they are used almost exclusively in a clinical sense. The basic Anglo-Saxon words for these functions, piss and shit, are considered vulgarities, despite the use of piss in the King James Bible (in Isaiah 36:12 and elsewhere). The word manure, referring to animal feces used as fertilizer for plants, literally means worked with the hands, alluding to the mixing of manure with earth. Several zoos market the byproduct of elephants and other large herbivores as Zoo Doo or Zoopoop, and there is a brand of chicken manure available in garden stores under the name Cock-a-Doodle Doo. Similarly, the string of letters BS, or the word bull, often replaces the word bullshit in polite society. There are any numbers of lengthier periphrases for excretion used to excuse oneself from company, such as to powder ones nose or to see a man about a horse (or dog). Slang expressions which are neither particularly euphemistic nor dysphemistic, such as take a leak, form a separate category. c- Sexual euphemisms The Latin term pudendum and the Greek term ÃŽÂ ±ÃƒÅ½Ã‚ ¹ÃƒÅ½Ã‚ ´ÃƒÅ½Ã‚ ¿ÃƒÅ½Ã‚ ¯ÃƒÅ½Ã‚ ¿ÃƒÅ½Ã‚ ½ (aidoion) for the genitals literally mean shameful thing. Groin and crotch refer to a larger region of the body, but are euphemistic when used to refer to the genitals. Euphemisms are more common in reference to sexual practices or orientations, particularly non-heterosexual ones, as shown in this quote from the UK version of Queer as Folk, which includes both euphemisms and dysphemisms regarding male homosexuality: Because Im queer, Im gay, Im homosexual, Im a poof, Im a poofter, Im a ponce, Im a bum boy, batty boy, backside artist, bugger, Im bent, I am that arse bandit, I lift those shirts, Im a faggot-arsed, fudgepackin, shitstabbin uphill gardener. I dine at the downstairs restaurant, I dance at the other end of the ballroom, Im Moses and the parting of the red cheeks. I fuck and am fucked, I suck and am sucked, I rim them and wank them, and every single man has had the fucking time of his life, and Im not a pervert. Virtually all other sexual terms are still considered profane and unacceptable for use even in a euphemistic sense. d- Euphemisms referring to profanity itself In the French and Spanish language, words that mean swear word are used as exclamations in lieu of an actual swear word. The Spanish word maldicià ³n, literally meaning curse word, is occasionally used as an interjection of lament or anger, to replace any of several Spanish profanities that would otherwise be used in that same context. In French (especially Canadian French), the word sacre, meaning religious profanity, is sometimes used as a substitute for an actual religious profanity (most commonly sacrament). 6-Euphemisms for death. (Wikipedia Encyclopedia, February 2007; Dead and Buried: Death Euphemisms, March 2007) The English language contains numerous euphemisms related to dying, death, burial, and the people and places which deal with death. The practice of using euphemisms for death is likely to have originated with the magical belief that to speak the word death was to invite death; where to draw Deaths attention is the ultimate bad fortune-a common theory holds that death is a taboo subject in most English-speaking cultures for precisely this reason. It may be said that one is not dying, but fading quickly because the end is near. People who have died are referred to as having passed away or passed or departed. Deceased is a euphemism for dead, and sometimes the deceased is said to have gone to a better place, but this is used primarily among the religious with a concept of Heaven. There are many euphemisms for the dead body, some polite and some profane, as well as dysphemisms such as worm food, or dead meat. The corpse was once referred to as the shroud (or house or tenement) of clay, a nd modern funerary workers use terms such as the loved one (title of a novel about Hollywood undertakers by Evelyn Waugh) or the dearly departed. (They themselves have given up the euphemism funeral director for grief therapist, and hold arrangement conferences with relatives.) Among themselves, mortuary technicians often refer to the corpse as the client. A recently dead person may be referred to as the late John Doe. The terms cemetery for graveyard and undertaking for burial are so well-established that most people do not even recognize them as euphemisms. Contemporary euphemisms and dysphemisms for death tend to be quite colorful, and someone who has died is said to have passed away, passed on, checked out, bit the big one, kicked the bucket, bitten the dust, bought the farm, cashed in their chips, croaked, given up the ghost (originally a more respectful term, cf. the death of Jesus as translated in the King James Version of the Bible Mark 15:37), gone south, shuffled off this mortal coil (from William Shakespeares Hamlet), or assumed room temperature. When buried, they may be said to be pushing up daisies or sleeping the big sleep or taking a dirt nap or six feet under. There are hundreds of such expressions in use. (Old Burma-Shave jingle: If daisies are your favorite flower, keep pushin up those miles per hour!). Euthanasia also attracts euphemisms. One may put one out of ones misery, put one to sleep, or have one put down, the latter two phrases being used primarily with non-humans. There are a few euphemisms for killing which are neither respectful nor playful, but rather clinical and detached. Some examples of this type are terminate, wet work, to take care of one or to take them for a ride, to do them in, to off, frag, smoke, whack or waste someone. To cut loose (from U.S. Sgt. Masseys account of activities during the American occupation of Iraq) or open up on someone, means to shoot at with every available weapon. To terminate with [extreme] prejudice originally meant to end ones employment without possibility of rehire (as opposed to lay off, where the person can expect rehire if business picks up), but now the term usually means kill. Often (though not always) an adjective is added for emphasis. In the movie Apocalypse Now, Captain Willard is told to terminate Colonel Kurtzs commission with extreme prejudice. The Dead Parrot Sketch from Monty Pythons Flying Circus contains an extensive list of euphemisms for death, referring to the deceased parrot that the character played by John Cleese purchases (the sketch has led to another euphemism for death: pining for the fjords, although in the sketch it was used by the shop owner to mean the parrot was not dead, but was merely quiet and contemplative). A similar passage occurs near the beginning of The Twelve Chairs, where Bezenchuk, the undertaker, astonishes Vorobyaninov with his classification of people by the euphemisms used to speak of their deaths. Also a scene in the film Patch Adams features Patch (Robin Williams) dressed in an angel costume, reading out various synonyms and euphemisms for the phrase to die to a man dying of cancer. This evolves into a contest between the two men to see who can come up with more, and better, euphemisms, ending when Patch comes up with and if we bury you ass up, well have a place to park my bike. 7- Euphemism in politics (Doublespeak) What, distinguishes doublespeak from other euphemisms is its deliberate usage by governmental, military, or corporate institutions. Doublespeak is in turn distinguished from jargon in that doublespeak attempts to confuse and conceal the truth, while jargon often provides greater precision to those that understand it (while potentially confusing those who do not). An example of the distinction is the use by the military of the word casualties instead of deaths-what may appear to be an attempt to hide the fact that people have been killed is actually a precise way of saying personnel who have been rendered incapable of fighting whether by being killed, being badly wounded, being captured in battle, being psychologically damaged, being incapacitated by disease, being rendered ineffective by having essential equipment destroyed, or having been disabled in any other way. Casualties is used instead of deaths, not for propagandists or reasons of squeamishness, but because most casualties ar e not dead, yet nevertheless useless for waging war. This type of euphemism may be found often in policy debate, such as the use of affordable to mean subsidized or the use of homeland for United States. (Lutz, 1987. Doublespeak: From Revenue Enhancement to Terminal Living. How government, business, advertisers, and others use language to deceive you. New York). Common examples WORD EUPHEMISM janitor custodian custodian building engineer crippled disabled disabled physically challenged retarded Mentally challenged retarded special, exceptional used second-hand Second-hand pre-owned victim survivor Died, dead passed away, passed Old person senior citizen, senior problem challenge problem issue product solution Illegal drugs illegal substances addiction substance abuse beggar panhandler panhandler the homeless (http://www.nyu.edu/classes/copyXediting/euphemisms.html)

Database Management System

Database Management System Database for more Complex Information data Aim To review Why OODBMS is the DBMS of Choice for Complex data. Introduction: The aim of this research is to review why Object oriented database system (OODBMS) is the database management system of choice for complex data application OODBMS is a database management system that supports the modelling and creation of data as objects, includes supports for classes of objects, inheritance of class properties, methods by subclasses and their objects. Some Client Server application uses RDBMS for data storage and Object oriented programming language for development. This type of scenario would have performance issues because objects must be mapped to the database tables this is referred to as impedance mismatch. To avoid this object-relational impedance mismatch problems caused by having to map object, it became necessary to have an alterative method of storing and mapping data. Client server application using RDBMS as described above is not a good choice for complex data as such OODBMS provides a better alternative. Origin and History of OODBMS Database Management System (DBMS) is software designed for managing and controlling access to databases. DBMS is â€Å"a shared collection of logically related data (and a description of this data) designed to meet the information needs of an organisation† (Connolly Begg). The first DBMS was introduced in the ‘60s and before this time, data handling was done using file based method. File based method stored data in individual data files with interface between programmes and files. Mapping happens between physical and logical file, where one file correspond to one or more several other programs. Extensive programming in third generation language like Cobol, were used in creating, manipulating and accessing data. There are so many problems with this method of storing data e.g. increased programme maintenance and development time, redundant data, weak security, separation and isolation which means each program maintains its own set of data, users of one program may not be aware of holding or blocking by other programs. As a result of the limitations in File based method a better way of data handling was required which led to the creation of DBMS to address these problems. The need to organise and share data on large sized projects also contributed to the creation of DBMS. DBMS control the organisation and structure of the data storage and is independent of the program that is being used to access the data. Early DBMS systems represent the first generation of DBMS and theses are: Hierarchical design by IBM Information Management System IMS.IMS is still the main hierarchical DBMS used by most large mainframe installations. Network design by General Electric Integrated Data Store (IDS) -CODASYL (Conference on Data Systems Languages) or DBTG Systems The main problems with the Hierarchical and Network designs are that the Systems lack structural independence and are very complex The distinguishing feature of storing data in files and databases is that multiple programs and types of users are able to use the databases. Relational database management system (RDBMS) The term Relational Database Management System (RDBMS) was introduced by Edgar Frank Codd in his paper, â€Å"A Relational Model of Data for Large Shared Data Banks† which was published in 1970. This paper formalized the basis for a RDBMS. RDBMSs are referred to as the second-generation Database Management systems, and the definition of what constitutes a relational database system with the guideline for the development of RDBMS is in Codds 12 Rules for relational systems published in 1985. RDBMS has three main characteristics which are: Information are held in form of a table, where data are described using values. Data in the table columns should not be repeated. Use of Standard Query Language (SQL). Relational model is the main data model and the foundation for many leading database products that include DB2 from IBM, Informix, Oracle, Sybase, Microsofts Access and SQL Server, and Ingres. The market for RDBMS represent close to a multibillion-dollar. No need for the use of predefined keys to input information in RDBMS which make it more flexible than the first generation DBMS. Also SQL is easy to learn making RDBMS more productive. the main advantage of RDBMSs is the ease with which users can easily create, access and manipulate data if need be. Other benefits of RDBMS are: Multi-threading for users. Asynchronous Input/Output for performance issues. Data Partitioning. Parallel database queries for processing complex query. Scalable architecture. Advanced management tools and security with automatic data logging and recovery Referential Integrity for Data consistency. Transactional management features for database consistency Though RDBMSs has served effectively for number of years, it has certain limitations that were exposed by increasingly demands for complex data types and high performance applications. RDBMS limitations include but not limited to the following: Relational databases are unable to handle complex multimedia data such as images, video and audio clips due to lack of storage capacity. RDBMS support only few simple datatypes, e.g. integer, floating point, character string and date/time. These user-defined datatypes are useful just for defining value domains. Some RDBMS support binary large objects (BLOBs, image, text) which are used as pointers to external storage, these objects are difficult to manage and exchange. Standard SQL is limiting, which made vendor to create specific extensions such as, Sybase Transact-SQL, Oracle SQL*Plus. Also RDBMS do not work efficiently with languages such as Java scripts and C++ which emerged after the RDBMS original development Impedance mismatch: The data type in the database systems is mismatching with the complex data structure created by application. RDBMS also uses mixed different programming paradigms, in which data with different types and locations are handled at the same time. Information in RDBMS are in tables where relationships between the entities are defined by values. Data in RDBMS cannot represent Real World Entities; normalization leads to relations that do not correspond to object in the real world Because of the above limitations and the challenges of Complex data applications, Internet and the Web usage, Object-oriented databases management system (OODBMS) was introduced in the 1980s. OODBMS offer extensible and controlled data management services, consistency, data independent and secure environment, to object-oriented model. OODBMS handle big and complex information systems that RDBMS was unable to handle. RDBMS has been very successful with huge investments in its development by many big database vendors. RDBMS has many loyal customer base in the corporate relational databases community and a large Industry based on RDBMS applications and systems development. Because of this, major RDBMS vendors (Oracle, IBM, and Informix) came up with another DBMS called Object Related Database Management System (ORDBMS) to allow organisations to run legacy systems and new Object Oriented based systems in parallel, and gradually migrates to the new ORDBMS technology as its benefits become more apparent Thus RDBMS vendors developed ORDBMS as a way to meet the challenges of the traditional RDBMSs and as a future proof for corporate investment. However ORDBMS still fail to hide the inherent mismatch between relational and object oriented database models. Object oriented database system (OODBMS) have their origin in Object Oriented Programming Languages (OOPL). OODBMS started as a research in the mid ‘70s, the research is based on having a real database management support for graph-structured objects. Around this time also, several shortcomings of RDBMS were highlighted within the database community and It was also acknowledge that OOPL had very strong advantages over the non-OOPL for many programming applications. Some of the advantages are: Strong encapsulations which make it easier to program large and complex applications Inheritance features, which enable code reuse. Application programmers also want to make object persistent that is object lifespan should extend beyond single program execution One of the early researches project on OODBMS was the ORION Research Project in the early 1980, which was conducted by Won Kim at the Microelectronics and Computer Technology Corporation (MCC). Two products were developed from the research, the ITASCA that is no longer in existence and the Versant OODBMS. Some other OODBMS commercial products are Gemstone that was known before as Servio Logic, Gbase (Graphael) and Vbase (Ontologic) In the early ‘90s addition products entered the market, some of these are: Objectivity/DB (Objectivity, Inc) ObjectStore (Progress Software, as acquisition from excelon which was originally Object Design) O2 snd Versant Object database (Versant Corporation) ONTOS (Ontos Inc formally Ontologic) ITASCA Jasmine (Fujitsu, marketed by Computer Associates) Some of these products are still available in the market with the introduction of new commercial Open source products in early 2004 e.g InterSystems , Ozone, Zope , FramerD and XL2. The open source products are gaining high recognition in the markets. The concepts of persistence to object programming language have been added to OODBMS. Early commercial products were integrated with programming languages e.g. Gemstone uses Smalltalk, Gbase uses LSIP and Vbase uses COP. C++ is the dominant language during the early 90s for OODBMS markets. Java and C# were introduce by vendors in the late 90s. The open source object databases are entirely written in Object Oriented Programme languages like Java or C#, e.g. db4objects (db4o) and Perst (McObject). Chris Muller has also recently created another open source Object database called Magma (Written in Squeak). Open Source products are reasonably affordable and easy to use and this opes the second growth period for Object database. Manifestos â€Å"The Object Oriented Database Manifesto† by Atkinson et al, 1989 listed the mandatory features that a system needs before it can be known as an OODBMS. Object oriented database manifesto abandons the relational model design by determining the basic rules of object database systems. The characteristics of the object DBMS is grouped into three by the Manifesto. Mandatory: Encapsulation, Object identity, types/classes, complex objects, overriding combined with late binding, inheritance, extensibility, persistence, computational completeness, concurrency, ad hoc query , secondary storage management and recovery facilities.. Open: this is decided on by the designer and include the representation of system, uniformity of type system and the programming paradigm Optional: includes multiple inheritance, type checking, inferring, distributions, versions and design transactions The OODBMS manifesto was unacceptable by some relational database professional, so another competitive manifestos was introduced â€Å"The Third-generation System Manifesto† by Stonebraker et al 1990.This manifesto retain all features of relational Database System that are practically proven (e.g. SQL) and augment the old features with new ones, e.g. the object-oriented concepts. â€Å"The Third Manifesto† which is written by Darwen and Date 1995 rejected both the object-oriented ideas and SQL which according to them defeat the relational models ideas, and to return to the genuine relational model and Codds 12 rule. The document produced for this manifesto is very controversial, from the current way software engineering and query/programming languages are done now. The arguments presented in this manifesto are more ideological rather than technical and this make the manifesto very difficult to be accepted by many databases professional. The newest version of the manifesto (2006) still retains these ideological assertions. Object-Oriented Database Management System Development review OODBMS stores Objects rather than data such as Integers, strings and real numbers, Objects consists of Attributes and Methods Attributes: They are data that defines the characteristics of an object. This data may be integers, strings and real number, or the data may be a reference to a complex object. Methods: This defines the behaviour of an object and methods are procedures or functions. The introduction of OODBMS was to reduce impedance mismatch between programming languages and database management system, to offer performance advantages and to provide clear support for complex user defined type including the ability to call, store and query complex object directly The developments of OODBMS support the modelling and creation of data as objects, extends programming languages with capabilities like data recovery, concurrency control, persistent and other relational capabilities. OODBMS are used when there is a need for good performance processing on complex applications because it takes a revolutionary approach to database management. OODBMS do not use table to store data, data are stored in objects and it handles concurrent access and provides a persistent store for objects in a multi-user client/server environment. OODBMS uses class definitions and traditional Object Oriented languages such as, C++ and Smalltalk for defining and accessing data instead of using separate language like SQL in defining, manipulating and retrieving data. OODBMS can be viewed as an extension of the OO language, providing direct integration to database capabilities. Object-Oriented database development initially focuses only on application that manages complex information like the Computer Aided Software Engineering, Aided Manufacturing (CAM) and Computer Aided design (CAD) applications. Other applications where object-oriented database technologies are now being used include: Telecommunications applications Hospital applications Finance institutions Multimedia applications Document/quality management OODBMS development enforces object oriented programming concepts such as data encapsulation, polymorphism, object Identity, inheritance as well as database transaction management concepts e.g the ACID PROPERTIES (Atomicity, Consistency, Isolation and Durability) which improve the integrity of the system.. OODBMS also support secondary storage management systems with ad hoc query languages , these permits the management of very large data. The inclusion of data definition within operations definitions in Object Oriented Database Management System has the following advantages: The defined operations are not dependent on the database application running at the moment and they apply ubiquitously. Inheritance allows the development of solutions for complex problems incrementally, and this is achieved by defining new objects in terms of the previously defined objects. Extension of Datatypes to support complex data such as multi-media, this is done by defining new object classes which have operations to support the new kinds of information. Object identity (OID) enables objects to be independent of each other in the database. Data encapsulation, this allows the internal state of the object to be hidden. Objects that are encapsulated are the ones that can only be assessed by their methods instead of their internal states. There are three types of encapsulated objects: Full encapsulation, here all the operations on objects are performed through message sending and by the execution of method. Write encapsulation, here the internal state of the object is allowed for reading operations only. Partial encapsulations, this allows direct access to reading and writing to some part of the internal state Another distinguishing characteristic of objects is that they have an identity that is independent of the state of the object. For example, if one has a car object and we remodel the car and change its appearance, the brake and the tires so that it looks entirely different, it would still be recognized as the same object we had originally before the changes were applied. Object-identity allows objects to be related as well as shared within a distributed computing network. All of these advantages come together to provide significant help to database application developers making development easier. The advantages also allow object-oriented databases development to solve information management problems that are characterized by the need to manage: A large number of different data types, A large number of relationships between the objects, and Objects with complex behaviours. An application development where this kind of complexity exists includes engineering, manufacturing, simulations, office automation and large information systems. Currently there is no widely agreed standard for what constitutes an OODBMS and no standard query language for OODBMS that is equivalent to what SQL is to the RDBMS. The Object Data Management Group (ODMG) a consortium of Object-Oriented Database Management System (ODBMS) vendors and interested parties working on standards to allow the portability of customer software across ODBMS products and to create a standardized Object Query Language (OQL) and object definition language (ODL). The work of ODMG on object data management standards completed in 2001 and the group was disbanded. The final release of the ODMG standard is: Object Database Standard (ODMG-3.0). Because the ODMG group was dissolved in 2001and this made the standardization of Object database languished. Another group was formed in 2005 called the OMG,s Object Database Technology Working group (ODBTWG) which is now working on a new standard to reflect recent changes in OODBMS technology. The main features of an OODBMS development is the way in which object is access in a transparent way such that interaction with persistent objects is the same as interacting with in memory objects. RDBMSs require the use of interaction through a query sub-language like SQL and the use of ODBC, ADO or JDBC. All this is unnecessary with OODBMS. In OODBMS when a request is made for an object in the database, the object is transferred into the applications cache where it is either used as a temporary value that is detached from the main version in the database so any updates to the cached object will not affect the object in the database. Object can also be used as the exact copy of the version in the database, so here any updates to the object are shown in the database and any changes to object in the database means the object has to be retrieved again from the OODBMS. There are a number of implementation of OODBMS with both research and commercial application. Each implementation is different based on the Object oriented languages, which form their origin. Some of these developments are discussed below: Gemstone: This was mainly based on smalltalk and its data definition and manipulation language is called opal. Gemstone do not provide all of most of the object-oriented features, it does not provide multiple inheritance. Iris: This is a research prototype, with the purpose if meeting the needs of applications like CASE tools, CAD etc. (Fisman et al (1987). It is designed to be accessible from any number of programming languages VBase: This is commercially available and is built with a schema definition language concept when objects are defined as data types. The main purposed of Vbase is to combine the procedural language with persistent object support, it also has the strong typing inherent in object systems for both language and database. O2: This is based on the framework of a set and tuple data model. It is designed with the purposed of integrating database technology with the object- oriented approach, for an all in one system. (Lecluse , et al 1988) Most of the OODBMS development discussed, tried to meet object orientation approach in someway, they do this by implementing various OODBMS features. There are major differences in the physical implementation of each model as well as the number of features implemented. Two Examples of companies using OODBMS are: British Telecominication uses Versant Mclaren develop the Formula one racing car uses Jasmine OODBMS Comparison criteria between RDBMS and OODBMS including the pros and cons. RDBMS and OODBMS differ in many ways example is in application domain, performance, usage, current market demand and support from vendors. RDBMS and OODBMS comparisons are done to get a better understanding for how the two databases differ and why OODBMS is better for large complex applications. A significant difference between object-oriented databases and relational databases is that object-oriented databases represent relationships explicitly, supporting both navigational and associative access to information data. As the complexity of the interrelation between database information increases, so is the advantage of representing relationships explicitly increase too. Explicit relationships usage also improves data access performance over relational value-based applications. Support for Object Oriented Programming Language (OOPL): Object Oriented Programming is not ideal for RDBMS, programmers spend most of the of coding time mapping the program object to the database In OODBMS, programming is direct and extensive, OOPL are designed to allow an application developer to create a complex sequence of instructions with less difficulty Standards: The defined standard for RDBMS is SQL, with main elements being DDL, DML DCL. The current version of the standard is SQL 3, SQL 3 defines the new features used in ORDBMS. ODMG is the group that maintains the standards for OODBMS the main components of standard being ODL and OQL. Most recent version of this standard is ODMG-3.0 and there are no new standard yet to reflect the advances in OODBMS technology. Product Maturity: RDBMS is a second generation and in a much matured stage. RDBMSs have good implementation with many support services such as the tool support for reporting, data transformations, OLAP tools etc. RDBMS is available from many vendors; this made it an obvious choice for most of the users. OODBMS is the 3rd generation DBMS making it relatively new, it emerged after the RDBMS, new ODMG standard still not in the final stage. Some implementations are available but still do not fully support all the features. Simplicity of use: The table structure in RDBMS is very easy to understand by user and also RDBMS has many end-user tools. OODBMS is mainly for developers, not many end user tools are available for object database products but this is hopefully expected to improve over time. Versioning of Data: Versioning of data is not supported by RDBMS but the user using multiple records with some of the attributes describing the versioning information can implement this feature. Versioning are defined by the user Versioning is supported naturally by OODBMS this is to maintain multiple versions of the data objects Complex data relationships: RDBMS provides basic relational tables, user-defined sets of records with system-defined domains, in addition to more high-level types defined in application. OODBMS has the same type system for system-defined and user-defined types. It is open-ended. Performance: OODBMS performed better than RDBMS based on the Object Operations version OO1 benchmark that was done on the OODBMS software (GemStone, Objectivit0079/DB, Ontos, Objectstore) and RDBMSs (Ingres and Sybase) in 1989 and 1990. Object in OODBMS is a better model of the real world entity than the relational rows in regards to complex applications. OODBMS outperform RDBMS when it comes to handling complex and interrelated data. Also the lack of impedance mismatch in OODBMS means they provide significantly better performance than RDBMS. Impedance mismatch require the mapping of one data structure i.e. tables to another data structure i.e. objects and this slows down performance on in RDBMs. Also the client catching features in OODBMS improve performance and also no joins are required in OODBMS Application Domain: RDBMS is used for large administrative systems, with many instances of simple data types; it can only handle short transactions and few data at a time. OODBMS is for design applications, with many and complex object oriented data types, handles long transactions and large client data. Semantic Gap (DDL/DML Vs. PL): RDBMS offers relational tables in some DDL and a standardized DML with client/server support and with embedded SQL in many Programming languages(PL). SQL is not computationally complete. Applications may have further, often high-level types and special storage structures expressed in some PL. In OODBMS, same OBJECT-ORIENTED PROGRAMMING LANGUAGES like C++ and small talk is used for both client and server. It does accommodate only object-oriented languages and does not accommodate cobol. The database PL is computationally complete. Query Optimization: This is very strong in RDBMS because of the restricted set of data type. OODBMS has poor query optimization because of the complex data structure Primary Keys: In RDBMS rows are uniquely identifying based on the value and also no two records can have the same primary key values this is to avoid error conditions. In an OODBMS, Object Identifiers (OID) which are system generated are used to uniquely identify an object and this is done behind the scenes and this is completely invisible to the user. With this feature in OODBMS there is no limitation on the value that can be stored in an object, thus increasing the efficiency of the database. Vendors Support : RDBMS is highly successful because of the large market size but most of the vendors of RDBMS are adding the capabilities of Object oriented to their applications so they are moving towards ORDBMS. OODBMS are targeting niche market because they lack of support from Vendors. This is due to the fact that the market for RDBMS is very large and it is difficult for vendors to move away from legacy systems that are mostly based on RDBMS. OODBMS Functionality and performance review: Complex process integration among companies is the driving force for adopting OODBMS. The capabilities of Objected-oriented programming language are integrated to the technology of DBMS in OODBMS. Designs of Object database are quite different because object database design is the essential part of the overall application design process. In OODBMS the Object classes used is the same as the classes used by the programming language. Data are stored in tables with columns and rows in relational databases i.e. data are represented in two-dimensional view. This is effective for applications that are simple, straightforward system, possessing low volume. RDBMS is good for application with simple relationships between data. Relational database technology failed to handle the needs of complex information systems because it requires the developer to force an information model into tables where relationships between entities are defined by values and, Relational database requires translation of sub-language like SQL and call interface like JDBC/ODBC. All these slows down the RDBMS data performance Support of abstract object interfaces is actively provided by OODBMS. It manages types, classes and methods, including the execution of methods. Data can be represented in more than two-dimensional view and relationships between data are represented explicitly which improve data access performance The basic functionality of relational database management systems is combined with new functionality of Object oriented in OODBMS. The basic functionalities are: Persistence Transaction Management and Concurrency control Security Recovery Data Access performance Query. Persistence: This is the ability of an object to be stored on a permanent medium and can survive program termination or shutdown. i.e. it can survive the duration of the OS process in which it resides. Persistence data to survive transaction updates they have to be stored outside transaction context. The addition of persistent to objects is essential to making OODBMS applications useful in practice this because most applications need to handle persistent data. Persistence is dealt with in OODBMS by the addition of persistence to object programming language like C++, Smalltalk and Java. OODBMS support persistent objects from data distribution, programming languages, transaction model, versions, schema evolution and generation of new types. Another way OODBMS offer persistence is through Inheriting from a common class. Transaction Management and Concurrency control: The use some form of versioning systems is the means of managing updates to multiple data at the same time in OODBMS, without any interference from one another. OODBMS products allow the objects to remain in the client cache after committing a transaction this is done so that the application is able to reference it again soon. This feature increase performance with the way data are stored and retrieved from the database. Concurrency control enables users to see the same view of object data in OODBMS. This allows a lot of reads and writes operations to go on in parallel while ensuring that the data is in consistent and good state. Security: Secure OODBMSs have certain characteristics that make them unique. The concepts of encapsulation, inheritance, information hiding, methods, and the ability to model real-world entities in object oriented environment provide security model in OODBMS. OODBMS may encapsulate a series of basic access commands into a method and make it public for users, while keeping basic commands themselves away from users. Little work has been done in OODBMS application to add security mechanism against malicious misuse of data. Recovery: Recovery features in OODBMS allow a consistent state of the database to be reinstated after a system crash or failure. This is done by either by rolling back the uncommitted transaction or rolling forward of transactions that has been committed but not completely flushed to disk. Data Access performance