.

Monday, May 25, 2020

Inequalities, Both Domestic and Global, Illuminate the...

2. Inequalities, both domestic and global, illuminate the inevitability and functionality of stratification. Discuss. The Cambridge Dictionary of Sociology defines inequality as ‘the unequal distribution of opportunities, rewards, and power among and between individuals, households and groups’(1). It goes on to say that ‘the subfield of social stratification has as its main task the description and analysis of inequalities, or the makeup of the stratification system of any given society’.(1) From this one definition, we can already begin to see the strong links that lie between inequalities and social stratification. As we delve deeper into the topics, we can begin to see both the inevitability and the functionality of stratification†¦show more content†¦In the Central African Republic, the infant mortality rate is 107 per 1,000(6). That means that an infant born in Norway has a 10 per cent higher chance of survival than an infant born in the Central African Republic. Even in the first few days after birth, inequalities exist between the lives of infants born in d eveloped countries and the lives of infants born in underdeveloped countries. Furthermore, the life expectancy at birth of a child born in Norway is 81.1 (5) years, whereas in the Central African Republic, the life expectancy at birth is 48.4 years (5). Again, inequalities exist between the infants born in developed countries and the infants born in developed countries. Although the Central African Republic has a high rate of infant mortality as well as a high death rate - 17.6 per 1,000 in the years 2005-2010(7), it also has a very high birth rate - 35.6 per 1,000 in the years 2005-2010 (8). This has lead to a very high population, which puts a huge strain on the resources of the country. Norway on the other hand, has a much steadier population, with a low birth rate - 12.6 per 1,000 in the years 2005-2010 (8) - but also a low death rate - 8.8 per 1,000 in the years 2005-2010 (7). The population is controlled and their are enough resources to serve the entire population. It is for this reason that Norwegians generally receive an average of 12.6 years of schooling (5). Contrast this with the Central African Republic, where citizens there

Sunday, May 17, 2020

Broken And A Broken Heart - 1009 Words

Broken Promises and a Broken Heart. Growing up without a father can be the hardest things a child has to go through. But growing up with a father that never truly loved nor cared about you, rips your heart open. It makes you not want to trust anyone, and I can for sure tell you that the only reason I am the way that I am is because of a man that I thought was my father. It turns out you can make someone a father just because they had kid. I’ll tell you what I remember about my dad; it might not be a lot of memories, but it sure does have a lot of meaning. One thing that I do remember very clearly is day his girlfriend was driving his van and she came around our neighborhood. I was outside playing with my mom when she was driving by. As soon as I looked up the van was driving down slowly. It’s like she wanted me to see the van. I got so excited I thought my daddy was finally coming to see me, so I started running towards the van then she drove off and I started running after crying. I couldn’t even go outside anymore, she was having way too much fun seeing me crying. You’d think that if your dad loved you he would stop drinking, doing drugs, put his family first and his band second. It never went that way and I think I’d trust him if he didn’t lie or break any promises. But I can tell you that there is no way in hell that I would ever let him back in my life. Why is that whenever I want to be happy things happen? How was my mother supposed to know that her two year oldShow MoreRelatedA Broken Heart750 Words   |  3 Pagesversus a strong man that is unbreakable like a rock. While girls are more open with their emotions, boys are just afraid of admitting their feelings. Especially when it comes to love. Sometimes that shyness and fear of a broken heart that invades man can be the cause of a broken heart. Many individuals claim that these stereotypes are totally erroneous, but my story prove them wrong. My story is that of a girl in love for 14 years of the â€Å"wrong boy†. It all started one day 14 years ago. Can a five yearRead MoreBroken Heart Essay1204 Words   |  5 PagesA broken heart is known as a metaphor for the intense emotional pain or suffering, we feel broken after losing a loved one. We all know the damage that a broken heart can cause because we have experienced it ourselves or have seen the reproductions on our loved ones. But a broken heart in medical terms is known as Cardiovascular di I have had many broken heart experiences over the last 7 years of my life. I really am still trying to fix my broken heart. When I lost my mom I felt as if my world hadRead MoreMy Broken Heart2085 Words   |  9 PagesDr. Ryder Finnegan English 1013 Composition 1 September 16, 2010 My Broken Heart I have a lot of wonderful memories from my childhood. Some of the best memories were the times I spent with my dad. He was a wonderful man, a gentle giant. His hands were strong and calloused, but his touch was as soft as his heart. He was the brightest star in the center of my universe. The day he died was the day my heart soul were irreparably broken. The bright star burned out for eternity, leaving my universe darkRead MoreThe Moral Decay Of A Broken Heart907 Words   |  4 Pagesto conquer. The lack of real relationships that this civilization forbid effects those who are confused on what they want and what they need. Sexual desire will not fulfil the empty longing for connection neither will a happy pill of Soma heal a broken heart. This utopia explains how the morals effect the action and culture of a community. If the community instructs that all male can have more than one sex partner than the culture and morals will be lost because the lust overcompensate the ethicalRead Mo reAnalysis Of The Broken Heart By John Donne1001 Words   |  5 PagesIV AP 17 November 2015 Imagery in â€Å"The Broken Heart† by John Donne Perhaps the most beautiful thing about humans is that emotions and thought seem to go hand in hand. One either distances or comforts the other. When together, these two things can create a mirror into human nature, or shatter what people see in themselves for another. The stability of the heart is something precarious and not fully understood, but it is through works as â€Å"The Broken Heart† by John Donne that we can see this stability;Read MoreMy First Broken Heart Of Love942 Words   |  4 Pageseach other in 7th grade. He had moved to Maryland from Texas with his father, step-mother, step-brother, and dog. Our relationship bloomed like a gorgeous rose then withered and eventually died. I was barely a teenager and I experienced my first broken heart. Love sucks. At first, when I saw the new kid in my math class, I thought that he would have a hard time fitting it. The first thing anyone would notice about this kid was how incredibly thin he was. He was severely underweight and looked veryRead MoreHow to Fix a Broken Heart Essay588 Words   |  3 Pageshadnt had been struck down by that hot babe you passed by everyday but one day found enough courage to come up and talk to her? Or been played by that stud with a sexy accent and an even sexier name? Who hadnt felt that invisible knife through your heart as the one you once called your sunlight, your love, your one and only happiness walked away from you forever? When total despair and desolation hit you, what do you do then? Some said time will heal itself; some said its better to be love and lostRead MoreHow I Heal A Broken Heart980 Words   |  4 PagesHow to heal a broken heart: 5 steps to mending the broken pieces. The person who discovers how to heal a broken heart, instantly, would become a hero. I am sure that they would win Nobel Prizes, become a billionaire, and get a free trip to Mars. Until this happens the only way to heal a broken heart is through time. Below, I will outline a few helpful tools to use, to make the healing happen a little easier. 1.) Don’t deny the heartbreak If you are like me, you probably ignore the signs of a heartbreakRead MoreThe Tragedy Of A Man s Broken Heart935 Words   |  4 Pagesstarted to shake with immense speed. You would think that I just witnessed a great tragedy. In a way, I guess I have. The tragedy of a man’s broken heart. Tears welled in my eyes. I can t believe he could, and would ever write something like that. Guys don’t write letters, but that idiot did. I think everyone tends to know too much. During that ceremony, I was broken. Just seeing him hold her hand crushed, and to think he merely did it to make me jealous. He was such an idiot. But, I felt myself drawnRead MoreBook Of Broken Hearts Literary Analysis803 Words   |  4 Pagesâ€Å"That was the thing about pictures. No matter how beautiful they couldn’t capture the truly felt parts of a moment.† The Book Of Broken Hearts is about a girl trying not to fall in love with a â€Å"flawless† boy. In the story the reader can put together piece by piece how she is falling for him. The story’s main base in the beginning is talking about her dad and how she wants to spend the whole summer with him because his Alzheimer’s is getting worse and worse every day. She explains to her friends how

Friday, May 15, 2020

Intranet mail system - Free Essay Example

Sample details Pages: 33 Words: 9817 Downloads: 7 Date added: 2017/06/26 Category Internet Essay Type Essay any type Did you like this example? ABSTRACT This motive of this project is to develop a Intranet web server which makes the users to use the functions such as receiving and sending mail through this server and the users are provided with the environment of GUI so it provides the users easy means of sending and receiving mail and the administrators also provided with the facility to create and delete the user account. This web server which we develop first starts with the welcome page and the page prompts the user to sign in with the pretreated username and with the authenticated password. After this the user can use the facility of sending and retrieve mails using the Intranet web server. Don’t waste time! Our writers will create an original "Intranet mail system" essay for you Create order The Intranet web server is similar to the mail system which the common people use which asks the username and a password for authentication after it verifies the user and then the user is allowed to retrieve and send mail but the only difference with this Intranet Mail server is that communicate with the people by the means of one common domain or to use internal webs for the better communication cut costs, speed up business processes and, more recently, increase revenue through e-commerce 1. INTRODUCTION INTRANET DESCRIPTION AND BACKGROUND An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organizations information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organizations internal website, but may be a more extensive part of the organizations information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Any of the well known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-mail), and FTP (file transfer protocol). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data. Intranets may provide a gateway to the Internet by means of a network gateway with a firewall, s hielding the intranet from unauthorized external access. The gateway often also implements user authentication, encryption of messages, and often virtual private network (VPN) connectivity for off-site employees to access company information, computing resources and internal communication. NEED OF INTRANET: The Intranet Mail Server is applicable in this century forwarding success and growth for persons or unemployed who are in search for job or those who work on shifts. Many of the organizations nowadays work on shift basis due to heavy work load and so to this load by shifts. So for people who work on shifts, intranet mail server proves to be more beneficial, by providing this service to the employees who work within an organization and the employees can register themselves and thereby it reduces the work load of an employee and easier transactions of information and documents. No necessity of paying money for the mailing facility (i.e. free of cost). Merits of preferring intranet mail service over other mail service so as to reduce the time usually required by our traditional mailing system ie internet mailing system. Also no internet connection is required this is main advantage of our mailing system. Intranet mailing system is used within a wide range in a organizations reachin g various departments or branches and requires just a single host server. This system can be used only by the employee of an organization as it is been secured and registered by a particular employee, due to this the information or any document remain secured and confidential without the problem of insecurity. The multiple numbers of branches are linked to a host and then an employee of within organization only uses this facility. An employee or user can send particular data between branches. ADVANTAGES WITH THE INTRANET MAILING SYSTEM The users of Intranet Mailing System are given a unique login id and must give the correct password. It gives total security for us. So unauthorized user cant allow seeing our messages. Even if the user forgets his/her password reminding facility by which the user can recollect the password and log into the system. The main advantage of the Intra mail system is its security feature allowing only registered users to access the system and preventing any hackers, unauthorized users. As the access for the IMS is only restricted to the people registered within the organization itself and information is transferred within the organization itself, and all this transformation will be up to some limit so the data transformation will be fast USES OF INTRANET MAIL SYSTEM BENEFITS * Workforce productivity: Intranets can help users to locate and view information faster and use applications relevant to their roles and responsibilities. With the help of a web browser interface, users can access data held in any database the organization wants to make available, anytime and subject to security provisions from anywhere within the company workstations, increasing employees ability to perform their jobs faster, more accurately, and with confidence that they have the right information. It also helps to improve the services provided to the users. * Time: Intranets allow organizations to distribute information to employees on an as-needed basis; Employees may link to relevant information at their convenience, rather than being distracted indiscriminately by electronic mail. * Communication: Intranets can serve as powerful tools for communication within an organization, vertically and horizontally. From a communications standpoint, intranets are useful to commu nicate strategic initiatives that have a global reach throughout the organization. The type of information that can easily be conveyed is the purpose of the initiative and what the initiative is aiming to achieve, who is driving the initiative, results achieved to date, and who to speak to for more information. By providing this information on the intranet, staff have the opportunity to keep up-to-date with the strategic focus of the organization. Some examples of communication would be chat, email, and or blogs. A great real world example of where an intranet helped a company communicate is when Nestle had a number of food processing plants in Scandinavia. Their central support system had to deal with a number of queries every day. When Nestle decided to invest in an intranet, they quickly realized the savings. McGovern says the savings from the reduction in query calls was substantially greater than the investment in the intranet. * Web publishing allows cumbersome corporate kn owledge to be maintained and easily accessed throughout the company using hypermedia and Web technologies. Examples include: employee manuals, benefits documents, company policies, business standards, newsfeeds, and even training, can be accessed using common Internet standards (Acrobat files, Flash files, CGI applications). Because each business unit can update the online copy of a document, the most recent version is usually available to employees using the intranet. * Business operations and management: Intranets are also being used as a platform for developing and deploying applications to support business operations and decisions across the internetworked enterprise. * Cost-effective: Users can view information and data via web-browser rather than maintaining physical documents such as procedure manuals, internal phone list and requisition forms. This can potentially save the business money on printing, duplicating documents, and the environment as well as document mainte nance overhead. In 1996, Cisco processed 54,000 reports and the amount of dollars processed was USD19 million. * Enhance collaboration: Information is easily accessible by all authorised users, which enables teamwork. * Cross-platform capability: Standards-compliant web browsers are available for Windows, Mac, and UNIX. * Built for one audience: Many companies dictate computer specifications which, in turn, may allow Intranet developers to write applications that only have to work on one browser (no cross-browser compatibility issues). Being able to specifically address your viewer is a great advantage. Since Intranets are user-specific (requiring database/network authentication prior to access), you know exactly who you are interfacing with and can personalize your Intranet based on role (job title, department) or individual (Congratulations Jane, on your 3rd year with our company!). * Promote common corporate culture: Every user has the ability to view the same informa tion within the Intranet. * Immediate updates: When dealing with the public in any capacity, laws, specifications, and parameters can change. Intranets make it possible to provide your audience with live changes so they are kept up-to-date, which can limit a companys liability. * Supports a distributed computing architecture: The intranet can also be linked to a companys management information system, for example a time keeping system. PROBLEM OF THE EXISTING SYSTEM To send any information they have to send manually, which is very difficult to perform and it will take lot of time. In order to transfer information from one department to another they have to maintain much number of employees which is difficult. Sometimes there is a chance that workers may make mistakes such as incorrect delivery of information, loss of files, etc†¦ This will lead to huge loss to the organization if the information is important. While information is transferring from one department to another department there is no security With the increasingly prevalent use of e-mail as a communication device, companies have opened themselves to an additional and substantial set of risks. Large companies are quickly learning the value of a serious e-mail policy. For example: Employees at Xerox were downloading such a high volume of pornography that the information system became saturated, and legitimate e-mails could not get through. As aresult of investigation, 40 e mployees were fired. Dow Chemical had a policy against pornographic e-mail. When they violated the policy, 64 workers were fired and 230were disciplined. More than 20 workers at the New York Times Company were fired for sending or receiving e-mails with sexual images and offensive jokes. Another 20 workers were reprimanded.9 These examples show the increasing trend of companies toward the adoption and enforcement of specific e-mail policies. As evidenced by some of the cases described here, these risks can potentially lead to significant financial losses. It is, therefore, imperative that contemporary companies assess the possibility and magnitude of these risks and accordingly design, implement and enforce comprehensive e-mail policies. AIM OF THE PROJECT: The main Aim of the project is to perform all the activities by the Intranet mail system in an organization or in a company so that this will reduce the transferring of the mail manually. We can reduce the number of workers and speed up the information transferring by providing the computer based system for their needs. We can also provide easy communication between different departments of the organization. It also provides high security for the information. HOW TO SET UP AN INTRANET MAIL SYSTEM Following are the most basic steps in setting up an intranet . PLAN YOUR INTRANET Implementing an intranet must fit your organization to be effective. Before you start creating intranet mail server make sure what you want to achieve with your intranet. take the size and complexity of your organization into consideration and understand how the intranet can enhance your organization productivity Hardware: In order an intranet for your organization you first have to build a network. this usually requires a server, web server software such as Apache or Microsoft IIS and either wifi connections and cards or Ethernet cables and a NIC. Intranet software While you will usually have the server software on hand ,running as intranet means that individuals in your organization will access to find documents ,download drivers and updates and conduct searches for information that they are searching for. Some of the essential web features that you will want to add are: ClientManaging Function: The Client Managing function gives you the administrating control the intranet mail server, such as adding users, removing users and keeping the intranet running smoothly. Employee Directory: One of the most used features of any intranet mail servers is the employee directory. How many employees are always looking for contact info, whether it is a phone number , email, address ,fax ,title and some can even include an organizational chart Project Management: A great time saver is the ability for many people within an organization to collaborate an a project whether it is a basic as a mission statement or as a budjet. Document share: Your organization will want to make available certain information for its members when they need it. This can mean important documents such as reports or other types of documents such as health benefit materials. Shared calendar A great feature to have if you worek within a work group or small organization is to know others schedule so that you can know project time lines. Company news: One of the ways that the organization can communicate with its members is with the company news IMPLEMENT YOUR INTRANET MAIL SERVER: Now you have planned about your Intranet mail server,have purchased all the necessary hardware and software now you can build up the intanet mail system.Building your intranet mail server is not putting all the hardware and software together but it also means that you make available the information and tools necessary for your organization members to use the intranet mail server effectively. MANAGING AN INTRANET: There are three ways of managing an intranet: A single, tightly managed server: only approved documents get posted, and the site has a single, well-structured information architecture and navigation system under the control of a single designer. Even though this approach maximizes usability of the information that passes the hurdles and gets posted, this is not the best way to build a corporate information infrastructure because the central choke point delays the spread of new and useful information. A totalitarian intranet will cause you to miss too many opportunities. A mini-Internet: multiple servers are online but are not coordinated, complete chaos reigns, you have to use resource discovery methods like spiders to find out what is on your own intranet, no consistent design (everybody does their own pages), no information architecture. This approach might seem to increase opportunities for communication across the company, but in reality does not do so since people will be incapable of finding most of the information in an anarchy. Managed diversity: many servers are in use, but pages are designed according to a single set of templates and interface standards; the entire intranet follows a well-planned (and usability-tested) information infrastructure that facilitates navigation. This is my preferred approach. Literature Review of Subject For any organization to reach great heights and success can be obtained only by good corporation of employee between themselves and cooperation of head of organization with the employees so as to get the feedback from them and do necessary needs requires, this is nothing but a theoretical concept for intranet mailing system called as Corporate communication. In their early stages, when there was no such system people lacked knowledge about various design standards, definite structure of an information, support from other organizations so the employees lacked adequate information that they were looking into and therefore they couldnt reach their aim for a particular information. In recent years, the organization has seen tremendous development due to Intranets to solve not only existing collaborative efforts and put all the online potential. To interpret the capability and efficiency of Intranet Mail Server, interviews, periodicals, previously accomplished case studies and past pers onal experience, adopting these techniques this research shows that the corporate world is seeing Intranets as an important contributor towards reaching their corporate vision. This system not only reduces the cost of the computer mailing system but also provides information with greater speed and efficiency. In the last few years Internet turn into complex part of everyday experience. It serves as a line of approach for personal or private communication worldwide. After the internet and world wide web arrives this field has been back into existence. Initially software makers concentrated on web browsers. The internet knowledge is shared among the people later. Then the software makers got an opportunity to involve corporate customer to design intranets. Then the storage of employee data on paper are reduced and also no need to go to the human resource office to update the personnel information. Then there is a cut down in cost to afford the employees of an organization for the c orporate meetings. Instead of that they have their meeting at their desks. In this process intranets are saving a number of hours and money and also improving corporate communication. If the communication is forever good then there is a growth in corporate culture. Intranets provide users to have quick access to resources in an organization. The corporations should be aware of success when they setup and intranet. INTRANET DESCRIPTION: The rapid growth of the Internet and World-Wide Web(WWW) has allowed more people access to global computer network and network applications. Internet Service Providers (ISP) profit by offering many kinds of Internet services such as electronic mail, WWW, FTP, and others. Some closed computer user groups such as companies, research centers, or a universities, have opted for smaller, Internet-like network environments called ‘Intranets. Intranets provide integrated network services using Internet technologies that are, technically, the same as Internets. Intranet services, however, are more integrated and task specific services with consistent user interfaces. Intranet is gradually replacing old proprietary messaging systems such as Bulletin Board Systems (BBS) and document processing systems. Electronic mail service is one of the most popular and essential services in both Internet and Intranet. There could be no Internet/Intranet services without the electronic mail servic e. Mail server is a computer system that sends and receives electronic messages for a number of users in a certain management domain. Mail servers are connected to networks and should reliably process incoming and outgoing mail messages. Sending and receiving tasks are actually processed by a special software called mail server program running in the mail server. The most widely-used Internet mail server program is send mail, which was first developed in 1982 for 4.1 BSD UNIX system Since electronic mail service is booming, mail servers are handling more and more user messages. The mail servers and reliability do not always satisfy user requirements. Even when the mail server runs normally, the administrator of mail server need to know the current status of servers. They need to know how many mail messages their system processes, how many errors occur when the system handles messages, how much hardware resources their system needs, and more. Systematic management of electronic ma il servers naturally has evolved so mail server administrations may satisfy expanding market demands. Systems and services management has become very important area of research and development, coinciding with the need and establishment of international standards. For example, ISO/ITU-T has developed the OSI management framework . The managing complexity of the OSI model, for Internet-based systems and services, motivated Internet Engineering Task Force (IETF), to create a simple and light management framework called Simple Network Management Protocol (SNMP) . For our research, we have chosen SNMP as the mail server management framework. There is another big trend in the systems and services management. As WWW technologies are rapidly evolving, those technologies such as Java and Common Gateway Interface (CGI) are applied to many computing areas. Systems and services management is one of such areas that WWW technologies can be adopted to increase the efficiency and usability of mana gement systems. Web-based management has a lot of benefits . It is hardware independent. Web technologies are general enough to be applied in any hardware platforms. It is a cheap and ubiquitous solution in most computing areas. Users access management systems using Web browsers. No other additional investment is needed. Using Web browser is trivial and very easy to learn. It is also location independent. Wherever you are, you can connect to the management server and check the current system status anytime. In this paper, we present the design and implementation of an Internet/Intranet mail server management system. The system integrates two different technologies the SNMP and the Web. Our system combines advantages from both technologies so people may remotely manage their mail server systems easily and effectively. We have made our design general enough to be extended to manage any Internet/Intranet service such as WWW, FTP, or gopher. Intranet is the generic term for a collec tion of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or workgroups to improve the data sharing capability and overall knowledge base of an organizations employees. An intranet is a private computer network that uses Internet Protocol technology to securely share any part of an organizations information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network within an organization. Sometimes the term refers only to the organizations internal website, but may be a more extensive part of the organizations information technology infrastructure. It may host multiple private websites and constitute an important component and focal point of internal communication and collaboration. Any of the well known Internet protocols may be found in an intranet, such as HTTP (web services), SMTP (e-ma il), and FTP (file transfer protocol). Internet technologies are often deployed to provide modern interfaces to legacy information systems hosting corporate data. Intranets may provide a gateway to the Internet by means of a network gateway with a firewall, shielding the intranet from unauthorized external access. The gateway often also implements user authentication, encryption of messages, and often virtual private network (VPN) connectivity for off-site employees to access company information, computing resources and internal communication. Its a confusion with many people that intranet is wrongly spelled for internet. Intranet is the generic term for a collection of private computer networks within an organization. An intranet uses network technologies as a tool to facilitate communication between people or workgroups to improve the data sharing capability and overall knowledge base of an organizations employees. Intranets utilize standard network hardware and software technologies like Ethernet, WiFi, TCP/IP, Web browsers and Web servers. An organizations intranet typically includes Internet access but is firewalled so that its computers cannot be reached directly from the outside. Intranet Mail Server is mainly designed to cater the need for communication between the employees of an organization in an intranet. The branches of the organization may be located in locally distant places where there is always a need for interchanging information. This system helps in inter-message communication between employees of such an organization. The employees of the organization under this intranet can only make use of the features embedded in it. The system is capable of performing all the things which a mail server can do. It keeps track of the mails sent and received to and from various employees of the organization, wherever they are. Other sections included in the system are to view and edit account, keep track of contacts details, use a calendar to notify the user about events and a notepad to save personal notes for future use etc. The organization may be having any number of branches in various locations and each one will be having an administrator to manage that particular firm. Each administrator is given the right to handle all official details of the employees under his branch only. He could view and edit the account details of employees of the firm for which he is the Admin. Each employee can request anything regarding official matters through his corresponding administrator. The system has provisions which enable each administrator to block mails for some employees of his branch under certain conditions. An acknowledgement mechanism for very important messages is also included in the system. The entire system is controlled by the main Administrator who has the only right to create users who are the administrators of various branches. These users have somewhat power of admin as they can create employees within their branch and manage them. Each and every user of the system, be the Administrator or admin power users or the normal users, is able to perform the following things within the system. The main things which are handled in this system are as follows. Mail Messaging. Managing Account Details Managing Contacts. Calendar Events Notepad. The project is developed with a front end of JSP and JAVA SERVLETS and Oracle as backend.so let us see in detail of the development of the project. MODEL VIEW CONTROLLER FRAMEWORK Web applications along with java can be created by core system called servlet. Server which uses servelt technology is java server pages which can further be extended by HTML content. JSP does not replace the servlet but only accompanies it to build on servlet and can also overcome any demerits obtained by servlet technology alone. There are 2 demerits that fall under two broad areas: Creating a â€Å"separation of concerns†: Parts of a particular code packed separately and are given a standard protocol so as to communicate these particular codes within themselves An infrastructure for webapps: This includes things like to update registered member input so as to check proper information is submitted by the user, in order to avoid handling and reporting errors. If shortcomings are addressed, the very practical problems of building webapps (Robustness, maintainability, localization, etc) Become easier to answer. One model which can be addressed in resolving thes e demerits is an organizing Principle called Model-View-Controller (MVC) design pattern. Struts and MVC In Struts, Model code consists of plain old Java objects (POJOs). A struts place is very simple and applicable directly with the model code on the webapp. It is not necessary to put forward the data access into model so as to achieve MVC nirvana within a short period of time and with proper efficiency. There is no need of any help to separate Model from View and Controller. View code mainly consists of two parts: JSPs Set of custom tags along with Struts. Custom tags within the view code helps to make apart view from controller so as to avoid the issues which were obtained with MVC when it was apparently applied to registration Webapp. Controller code with struts falls into three distinguishable parts: SIMPLE VALIDATION Action form which enables to be a subclass of Struts helps to obtain simple validations. Examples: length of password must be strong as per needed i.e. nothing but password validation or email address format. COMPLEX VALIDATION Action which enables to be a subclass of Struts which accompanies Complex validations and business logic are Example:The check for the duplicate user ID for the Registration so ad to avoid any crime or leak out of any confidential information webapp is an example of complex validation. Example for business logic: calculating the total amount due after a purchase in a shopping cart webapp. Flow control is also decided by your Action subclasses, restricted to paths declared In the Struts configuration file called struts-config.xml SERVLETS: Servlets are modules of Java code that run in a server application (hence the name â€Å"Servlets†, similar to â€Å"Applets† on the client side) to respond to users doubts and give them desired solution. Servlets are usually not in combination with a unique user-server procedure but they can be usually used in combination with HTTP. Servlets acts by providing java based solution in order to avoid or execute the errors when done with server side programming, including in extensible scripting solutions, platform specific APIs and incomplete interfaces. Servlets provide a unique barrier to be plugged up with java based server. Advantages of using servlet in server application is to reduce the user incompatibility by performing independently on its own, extensively loadable, acts as a pluggable helper byte code objects. For example, a HTTP servlet can be used to generate HTML content. When we use servlets to do dynamic content, we get the following advantages: They are faster and clearer than CGI scripts. They use a standard API (servlets API). They provide all the advantages of Java. The attractiveness of servlets: There are many features of servlets that make easy and attractive to use, these include: Easily configured using the GUI based Admin Tool. Can be loaded, invoked from a local disk or remotely across the network. Can be linked together or chained, so that one servlet can call another or several servlets in a sequence. Can be called dynamically from HTML pages. Are secure even when downloading across the network. Java standards extension classes are used by servlets in the form of javax servlet which is known to be the basic framework for servlet and also uses javax servlet http acts as extensions for servlet framework usually used to respond the HTTP requests. As servlets consists of a portable java language due to which server extensions are very complex and operating system works on its own ability without any help. Typical uses for HTTP Servlets include: Working on a particular data for its improvement and keeping it confidential which is submitted by an HTML form. Any database problem provided by user returns with desired solutions with extensive content.  ¨It acts by processing a request by client with the help of environment variable,here a standard input is provided about the issues and output is obtained in desired format with the help of standard output stream. CGI programme or CGI script helps to provide ouput in form of separate instance. THE BASIC SERVLET ARCHITECTURE: A servlet particularly designs javax.servlet.servlet interface. Most servlets, however, extend one of the standard implementations of that interface, namely javax.servlet.GenericServlet and javax. servlet. http .HttpServlet . Initialization of servlet: A server user uploads servlet therby creating a desing or instance by calling the no-args contructor and then later it calls the servlets init method. Here servlet must make an onetime protocols and preserve the ServletConfig so that it can be used in future whenever required this can be done by calling the Servlets getServletConfig () method. Retriving of data is handled by GenericServlet. Servlet which extend Generic Servlet (or its subclass HttpServlet) should call super. At the beginning of the init method it makes use of this feature. The ServletConfig object mainly has Servlet parameters and a reference to the Servlets ServletContext. The init method is guaranteed to be called only once during the Servlets lifecycle. It does not need to be thread-safe because the service method will not be called until the call to init returns. Whenever Servlet is started the service method is called for each and every issue or request raised by user to the servlet. The method is called co ncurrently as many users can indulge at the same time. When servlet is needed to be uninstalled whenever an improved version of the existing is obtained or when unexpected shut down has occurred then here the destroy method is called. There may still be threads that execute the service method when destroy is called, so destroy has to be thread- safe. All resources which were allocated in init should be released in destroy. This method is guaranteed to be called only once during the Servlets lifecycle. Time Thread1 Thread2 Thread3 Figure 6.2.1 A Typical servlet life cycle Form Processing Servlet: This section shows how to Processing of the form data Management of persistent data Use of init parameters. The Servlet program written provides a user interface to a mailing list through HTML forms. User enters an email address in text field and then user subscribes itself to the list. Servlet contains two parts: * Proper management of data obtained. * Interaction with user or client. Data Management: Java programmer can easily tackle with maintaining the data. Servlet can have data which persists between requests we load the address list only once, when the Servlet is initialized, and save it every time it has been changed by a request. An alternative approach would be keeping the list in memory while the Servlet is active and writing it to disk in the destroy method. This would avoid the overhead of saving the address list after every change but is less fail-safe. If for some reason the address file cant be written to disk or the server crashes and can not destroy the Servlet, all changes to the list will be lost even though the users who submitted the requests to change the list received positive responses. Client interaction: The client interaction is handled by two of the standard HttpServlet methods, doGet and doPost. The doGet method replies to GET requests by sending an HTML page which contains the list of the currently subscribed addresses and the form that is used to subscribe or unsubscribe an address. The response content type is again set to text/html and the response is marked as not cacheable to proxy servers and clients (because it is dynamically created) by setting an HTTP header â€Å"pragma: no-cache†. The form asks the client to use the POST method for submitting form data. The doPost method receives the submitted form data, updates the address List and sends back a confirmation page. First the form parameters â€Å"email† and â€Å"action† are retrieved with the GetParameter method of HttpServletRequest. GetParameter (and also getParameters and getParameterValues) can be used to retrieve form data from both POST and GET requests. As an alternative we can use getQueryString for a GET request and getInputStream for a POST request and parse the application. We cannot use both ways of getting the request data together in one request. User Authentication via Sessions: Sessions can be used for authentication. In contrast to HTTP Basic Authentication a session can be invalidated which enables users to log out without quitting the Web Browser (which is required with Basic Authentication because there is no way to force a browser to delete the authentication credentials). HTTP: HTTP (â€Å"Hypertext Transfer Protocol†) protocol is usually used by any user or client who needs to surf for information also know as WWW browser. HTTP responds only any request is forwarded by a client or user which is called as request-response oriented protocol. An HTTP request consists of a request method, a URL header fields and a body. An HTTP response obtained after entering the query contains a result code and again header fields as in request and a body. The service method of HttpServlet sends request so as to obtain HTTP request methods using different java methods. The methods are GET, HEAD, PUT, POST, DELETE, OPTIONS and TRACE apart from these methods also a response is obtained for a particular request known as Bad Request HTTP error. An HTTP method XXX is dispatched to a Java method doXXX, e.g. GET- doGet. All these methods expect the parameters â€Å"(HttpServletRequest req, HttpServletResponse res)†. The methods do Options and do Trace have suitable default implementations and are usually not overridden. The HEAD method (which is supposed to return the same header lines at a GET method would return, but doesnt include a body) is performed by calling doGet and ignoring any output that is written by this method. That leaves us with the methods doGet, doPost, doPut and doDelete whose default implementations in HttpServlet return a Bad Request HTTP error. The request data is passed to all methods through the first argument of type HttpServletRequest (which is a subclass of the more general ServletRequest class). The response can be created with methods of the second argument of type HttpServletResponse (a su bclass of ServletResponse). GET method is used in order to fulfill the clients request whenever an URL is entered in WWW browser,this GET request doesnt have any text and so it is empty.The response should contain a body with the response data and header fields, which describe the body (especially content-Type and content-Encoding). Whenever HTML form is incorporated by the client POST and GET both these methods are used. GET request enables URL to encode different parameters while the POST request these parameters are transmitted in the body.HTML editors and upload tools use PUT requests to upload resources to a Web Server and DELETE requests to delete resources. JSP: JSP stands for Java Server Pages. These are pages, which provide dynamic content required by the user using logic and data (XML, Database etc) on the server side. Sun Microsystems introduces JSP as an alternative to Microsofts active server page (ASP) technology. Similarity between ASP and JSP is that both are complied on a server instead on Web Browser that is prominently used by client. However, JSP is Java-based, whereas ASP is Visual Basic-based. JSP pages helps to bukit up web sites and gathering database information. JSEE or Java Server Pages is an extension of the Java Servlet technology. XML tags and scriptlets uses JSP pages which are being written in the Java programming language in order to get logic that develops the content for the page. It passes any formatting (HTML or XML) tags directly back to the response page. In this way, JSP pages separate the page logic from its design and display . Java Server Pages (JSP) are normal HTML with Java code pieces embedded i n them. A JSP compiler is used to generate a Servlet from the JSP page. Appearance and to maintain order of the content on Web pages JSP are used it is helped with servlets small programs use to modify web pages which are done in order to fulfill the request of the user Java servlet that links to HTML page this file name is given the suffix as java server pages. JSP works in similar fashion as other servlets it first transforms to java servlet and processes users requests known as HTTP request. JSP technology translates into java servlet in a more convenient way than any other servlet as soon as the application is started; this translation is triggered by .jsp file name extension in a URL. JSPs are going together diverse system in one unique compact form with servlets. We can include output from a servlet or forward the output to a servlet, and a servlet can include output from a JSP or forward output to a JSP. WEB SERVER: Web it is an server where a particular kind of specific information is published on intranet or internet, this web server is used by clients or users so to obtain required information. Hypertext transfer protocol helps web server to transmit information. We can also set up the Web server so at to provide file transfer protocol ie FTP and also with gopher services. The FTP service can help user to send information from website and receive the same. The gopher services provides the user menu driven protocols to find the users requests for obtaining a particular document, the protocol used is supported by HTTP protocol. Web server enables us to: It acts by providing information to the user about their business, university or any organization to let people know about their firm and get adequate knowledge. EXAMPLES Publish a brochure so that it may be helpful to the customers Publish about any seminars, programs etc. Publish of any remote sales. JAVA SCRIPT The application which we run over the internet or intranet is with the help of java script. It is a object based programming language. This is used to run the application in client and the server. We can also create Hyper text markup language (HTML) pages using java script and also organizes the data using particular objects. HTML pages are engrafted with the java script programming. The effects of mouse clicks make out and answer due to these statements. When a user enters the information on the web page it can be checked by using the java script function. The engrafted java script of a html page can translate the text which is entered and tells the user whether the data base is valid or not. Advanced programs can access the database. The huge amount of data or information which is stored in database systems is used by application. The user information is stored on the data base of the online employees. A group of data is a data base which is maintained to explore, alter and up date RELATIONAL DATABASES: A most frequent method to organize data is relational model .The databases that are bonded to relational model are called relational databases. During the years 1970 and 1980 the IBM grew SQL (STRUCTURE QUERY LANGUAGE) to interact with the relational databases. Which is used in many ways.SQL is a data defined language to create, design and organize a database. We can update the data nothing but data manipulation language. Queries are also used to get the data from the data base. JAVA DATABASE CONNECTIVITY (JDBC) Java Database Connectivity, commonly referred to as JDBC, is an API for the Java programming language that defines how a client may access a database. It provides methods for querying and updating data in a database. JDBC is oriented towards relational databases. A JDBC-to-ODBC bridge enables connections to any ODBC-accessible data source in the JVM host environment.. Before the release of the Java 1.1 API, database support in java was extremely weak. Instead of releasing a halfway solution in the original releases, Java soft took the time to develop a set of keys APIs centered on enterprise systems development. Among these APIs Java 1.1 includes JDBC (Java database connectivity), a unified API for accessing relational databases. The issues surrounding database access are often very difficult; other languages use either proprietary APIs specific to individual database or complex universal APIs such as ODBC. JAVA DATABASE CONNECTIVITY OBJECT MODEL: The general idea where it goes around is Java.sql.Driver Manager java database connectivity model object is portrayed by the picture below The above picture shows that how the Java Data Base Connectivity works and Basic steps to use a database in Java Establish a connection Create JDBC Statements Execute SQL Statements GET ResultSet Close connection 1. Establish a connection import java.sql.*; Load the vendor specific driver Class.forName(oracle.jdbc.driver.OracleDriver); What do you think this statement does, and how? Dynamically loads a driver class, for Oracle database Make the connection Connection con = DriverManager.getConnection( jdbc:oracle:thin:@oracle-prod:1521:OPROD, username, passwd); What do you think this statement does? Establishes connection to database by obtaining a Connection object 2.Create JDBC statement(s) l Statement stmt = con.createStatement() ; l Creates a Statement object for sending SQL statements to the database 3.Execute SQL Statements String createLehigh = Create table Lehigh + (SSN Integer not null, Name VARCHAR(32), + Marks Integer); stmt.executeUpdate(createLehigh); //What does this statement do? String insertLehigh = Insert into Lehigh valuesâ€Å" + (123456789,abc,100); stmt.executeUpdate(insertLehigh); 4.GET ResultSet String queryLehigh = select * from Lehigh; ResultSet rs = Stmt.executeQuery(queryLehigh); //What does this statement do? while (rs.next()) { int ssn = rs.getInt(SSN); String name = rs.getString(NAME); int marks = rs.getInt(MARKS); } 5.Close connection stmt.close(); con.close(); DEFINING THE ADMINISTRATION AND USER REQUIREMENTS Our project website should provide easy access between user and the other section. It notices the possible users who are also contributing their in testing. Users aims and destinations are fulfilled describing the administration and user requirements. Measuring the design in oppose of needs. Produce design resolution. Obtaining design resolution using these method. Template employing. A outline for a website is with the huge organizations which we call templates. In these situations it is better to follow these organizations outline. A uniform outline gives comfort of use and also standard of the intranet in corporation. Maximum number of web site architect are not interested to follow this standard. Prepare web site construction. The best way to organize the site is according to how users see it. To achieve this goal, you can either follow the recommended guidelines (style guide) or (in the absence of guidelines) proceed according to the results of usability testing. Site structure should reflect the tasks users want to perform and information (chunks) they want to see. Examine design options. The design of the site should conform to recommended guidelines. In the absence of guidelines, the Web site should satisfy accessibility requirements. Evaluate Designs against Requirements The prototype should reflect the initial design of the Web site. Usability testing will identify design issues that will need to be corrected before the site is made available to the user community. When you have completed the prototype, invite members of your organization, department, and division for a â€Å"test drive.† Give testers tasks to accomplish and information to find. With the lessons learned, improve the design and retest it until you have resolved the design issues. When you are confident that the design satisfies user and organizational requirements, publish your Web site on the corporate intranet Web server and advertise it on the corporate intranets homepage. Contact the corporate webmaster for assistance to load the files to the server. Finished! Whats next? Keep the site up to date with the latest news and information. Investigate the number of visitors to your site and the pages they visit. In this way, youll identify popular and unpopular pages (informat ion) and tools. If you identify an increase in the number of visitors to a particular site or tool, then redesign the homepage to simplify access to the popular site. If pages have no visitors, either they are of no interest and should be removed, or visitors dont know the pages exist. Conduct a survey to identify their value to the user community before you make your decision. Redesign the site to improve productivity and efficiency, especially for forms and tools. Regular visitors will always welcome a â€Å"face-lift† if it helps to improve navigation. Post contact information and link to your e-mail address so that visitors can provide feedback. Praise builds confidence— and criticism provides suggestions for design improvements. Just like an Internet site, an intranet site is a living document. But with regular updates, youll help fulfill the purpose of your corporate intranet: improving both the quality and the speed of the companys internal communication. DESIGN SPECIFICATION: External Design: External Design of any software development involves conceiving planning out and specifying the externally observable characteristics of any software product. These characteristics include user displays and report formats external data sources and data sinks and the functional characteristics. Performance requirements and high level process structure for the product. Internal Design (Architectural and Detailed Design): Internal Design involves conceiving, planning, specifying the internal structure and processing details in order to record the design decisions and to be able to indicates why certain alternatives were chosen in preference to others. This phase also includes elaboration of the test plans and provides a blue print of implementation, testing and maintenance activities. The work products of Internal Design are architectural structure specification; the details of algorithms and data structure and the test plan. In architectural design the conceptual view is refined. Internal processing functions are identified, high level functions are decomposed into sub functions, internal data sources and a data structure are defined and interconnections among functions , data streams and data stores are established. UML DIAGRAMS USE CASE DIAGRAM CLASS DIAGRAM COLLABORATION DIAGRAM: TABLES: 1. users_table; Field Name Field Type Description USER_ID VARCHAR ID of the user PWD VARCHAR Password of the user 2. user_biodata_table; Field Name Field Type Description USER_ID VARCHAR USERNAME VARCHAR FATHERNAME VARCHAR BOD DATE ADDRESS VARCHAR CONTADDRESS VARCHAR EMAILID VARCHAR SECREAT VARCHAR ANS VARCHAR 3. Message_table: Field Name Field Type Description MSGFROM VARCHAR SUBJECT VARCHAR BODY VARCHAR MSGTO VARCHAR FLAG NUMBER DOS DATE MID VARCHAR DOWNLOAD VARCHAR FILENAME VARCHAR 4. Message_bulk_table; Field Name Field Type Description MSGFROM VARCHAR SUBJECT VARCHAR BODY VARCHAR MSGTO VARCHAR FLAG NUMBER DOS VARCHAR MID VARCHAR 5. Drafts_table; Field Name Field Type Description DFROM VARCHAR DTO VARCHAR BODY VARCHAR DOD DATE SUBJECT VARCHAR MID VARCHAR FLAG NUMBER 6. Trash_table; Field Name Field Type Description MSGFROM VARCHAR SUBJECT VARCHAR BODY VARCHAR MSGTO VARCHAR DOS VARCHAR MID NUMBER 7. Folders_table; Field Name Field Type Description MSGFROM VARCHAR SUBJECT VARCHAR BODY VARCHAR MSGTO VARCHAR FLAG NUMBER DOS VARCHAR MID NUMBER 8. Contacts_table; Field Name Field Type Description NAME VARCHAR NICKNAME VARCHAR MAILID VARCHAR PHONENO NUMBER ADDRESS VARCHAR 9. Sent_table; Field Name Field Type Description MSGFROM VARCHAR SUBJECT VARCHAR BODY VARCHAR MSGTO VARCHAR FLAG NUMBER DOS VARCHAR MID NUMBER Overview of Modules: This project is having different modules like new User creation form named it as a SignUp form and already existing user can logged into the Mailing System named it as a SignIn form. Intranet Mail Server which has been privatized and exists in different forms like Hotmail. Free mail. Cybermail, Maicity The project will give the easy way to create a new account and sending mails with free of cost. This was submitted with two modules given below SignUp Option SignIn Option 1. SignUp Option: This module deals with the sign up process. This module is having the facilities for creating new account. In Intranet mailing system this feature is provided by clicking SignUp option and it displays fill up form. In Fill up form the new user can fill all the details of the new user. This form will take all the details about the user. This will loads the information like Username, User Password. Confirms Password, the Age of the user, Sex, in which city user is living, the state belongs to the user, City, Pin code, Nation. This form contains some optional fields and some or compulsory fields. After entering the details in to the form the user can select the option provided on the fill up form. The option is Register. If we want to register to register, whenever the user click the button it verifies whether the user exists or not. If the user name is already present in the database system the corresponding dialog box will be given to the user and this proces s will be repeated until the user is entered new username which does not exist on the database. If not? it will checks further fields. If any one or more than one compulsory field is empty it gives the message to the user that the corresponding field is empty. If he enters values in all compulsory fields then the mailing system checks whether the user is entered the same values in the fields User Password and Confirm Password. If he entered same values the form will be submitted otherwise the system will gives the corresponding alert message to the user. 2. Sign In Option: If the user is already contains an account in this system, this form permit to enter in to this mailing system. Now he can use all the facilities provided by this Mailing System. A valid accountant can access these facilities by entering the two options provided by the logging screen, if not he can create the new* user account by using the facility of the Sign In form. By entering the Username and Password o f the user presses the Sign in button. If the username password are correct then system gives the permission to logon in to the Mailing system. This checking at the database side is compulsory for the purpose of authentication. Only a valid user can access the facilities provided by this present Intranet Mailing System. In this fashion this form is providing some sort of security. If the Username Password are valid, now the user is successful enough to logging on to the system, two frames are displayed. Left-hand side frame displays the user menu and the right hand side menu displays the information about how many mails he received. By clicking this user Inbox will be displayed. Functional Description User Menu: Provides a way to give any commands to the mail server the options include in the menu are Compose Inbox Sent Messages Addresses Options Logout 1. Compose Screen: This screen is obtained when the user selects the compose option from the mail folder. The fields in this screen are: To: Here the primary receivers address is to be entered Subject: Here the primary receivers address is to be entered. CC: Here the address of the receiver is typed where the same copy of the mail has to be sending. BCC: Here the address of the receiver is typed where the same copy of the mail has to be sending and receiver can receive only one copy separately it wont show all the different addresses Mail text to be Sent: This is the text area where the actual mail data has to be sent. Send: This is a button, used to send the mail 2. Inbox: If the user selects this option on the user menu the corresponding inbox of the user will be displayed. To read the different mails one option is provided as a subject by clicking on the subject place the corresponding mail will be displayed. 3. Sent Messages: Using these options the user can selects different messages, which are all ready sanded earlier. This is for the purpose of to know which message is sanded to whom. 4. Addresses: By clicking this option one more screen will be displayed on the right hand side of the frame that screen This screen is employed to create and to append new addresses to the database system. Here various listings of addresses with the name and there nick name. Here we have various options. Delete: Can be selected to delete the current address. Add:It will generate a new form to add a new address to the list with name of the address holder and the nickname. After clicking this Add option provided on the Address Screen one more form will be displayed having following options Name: Here name of the address holder is to be entered. Nick Name: Here nickname of the address holder is to be entered. MailId: Here MailId of the address holder is to be entered. Address: Here the actual address that is to be stored is entere d. Add: When clicked add button this address adds to the current screen. 5. Options: By selecting options menu one more screen will be displayed, the screen in Change Password Screen. It contains following providers Old Password Here the old password has to be typed; it is useful to check whether the user is an authenticated user to change the password. Change Password: Here the new password that is to be replaced with the old password is entered. Confirm: Here the users uses the same password to enter in the new field to confirm the change of password. Change: This button is to be clicked to actually change the old password to the new password. 6.Logout: By clicking this option the login session of the user will expire. If u wants to reenter in to the site one more option is to be provided, if u want sign out completely one more option is provided to sign out completely that is to logout the use completely from the site IMPLEMENTATION. IMPLEMENTATION ANALYSIS: The Analysis of the implementation alters formers system to modern. The former system lies in manually providing services to the employees of different of an organization. Employees have to go departments to know some particular information. Sometimes information is passed by manually between departments. This manual system will take more time and there may e loss of information. A wrong installation of the project leads to failure of the new intranet mailing system. The effectuation of the intranet mail server will improve the efficiency of the entire system. Implementation is actually installing the system on the users computer systems and testing it. This project is mainly developed to communicate within the organization. For this, the system has to load on the server and the permission should be given to the users. First the class file should be created for the system. After database administrator creates the users, permission should be given to run the system. The permission i s given to the users using login scripts. Whenever they log on to the system, all the files allocated to them come. Once the implementation reaches to its final stage, system conversation is the crucial stage of the implementation. There is several conversion strategies in which we must select anyone, which is applicable to our system. The current system is converted under the parallel conversion since the organization is large, the manual work and the computerized work are carried for some days until the developed system is well set for entire organization. Once the computerization is working well the manual work has been stopped in step-by-step manner. SYSTEM IMPLEMENTATION AND TESTING SYSTEM TESTING: System testing is probably the most important phase of complete testing cycle. This phase is started after the completion of other phases like Unit, Component and Integration testing. During the System Testing phase, non functional testing also comes in to picture and performance, load, stress, scalability all these types of testing are performed in this phase. By Definition, System Testing is conducted on the complete integrated system and on a replicated production environment. System Testing also evaluates that system compliance with specific functional and non functional requirements both. It is very important to understand that not many test cases are written for the system testing. Test cases for the system testing are derived from the architecture/design of the system, from input of the end user and by user stories. It does not make sense to exercise extensive testing in the System Testing phase, as most of the functional defects should have been caught and corrected d uring earlier testing phase.Utmost care is exercised for the defects uncovered during System Testing phase and proper impact analysis should be done before fixing the defect. Some times, if business permits defects are just documented and mentioned as the known limitation instead of fixing it.Progress of the System Testing also instills and build confidence in the product teams as this is the first phase in which product is tested with production environment. System Testing phase also prepares team for more user centric testing i.e User Acceptance Testing. TEST CASES: Test case 1: Test case for Login Screen When the user tries to login by submitting an incorrect id or an incorrect password, then this results in displaying a screen with the message as â€Å"login failed†. Test case 2 : Test case for compose Screen: When any field in the compose screen is failed to enter, then this results in displaying a screen with the message as â€Å"enter all the fields†. Test case 3 : Test case for change password screen: When the confirm password doest not match with the new password, then this results in displaying a screen with the message as â€Å"confirm password doesnt match with new password† Test case 4: Test Case for New user screen: When the user enters a user-id to register and the id entered already exists, then this results in displaying a screen with the message as â€Å"user-id already exists, choose a different id†. Test case 5: Test case for Add TO Address Book : When the user enters an invalid user-id the message is displayed as â€Å"the id you entered is not a valid one†

Wednesday, May 6, 2020

Stalin And The Soviet Union - 872 Words

(2)Stalin period was a significant period that his leadership had led the Soviet Union to develop in a very different way that contradicted to the thoughts of Lenin and Marx. Suny argued that Stalin constituted a â€Å"revolution from above,† which meant Stalin as a leader, led the people to make lots of changes by giving orders from the top of the hierarchy. The people were following him instead of initiating the changes and reforms. The industrialization, collectivization, and cultural conservatism (or cultural revolution, which was a term later China borrowed and used in a similar way) were Stalin’s major policies or ideologies that presented his â€Å"revolution from above† and a discontinuity between him and former Communist leaders. In 1928, New Economic Policy was abolished by Stalin. This move meant that Stalin was ready to start to build his system in the Soviet Union. During the same year, he adopted the First Five Year Plan, which was a generalized plan for the development of the whole state, to substitute NEP. This plan put an emphasis on heavy industry that actually helped him to gain support from the people. The workers were willing to support him since the plan provided millions of jobs. The economy recovered quickly since the industries could drive the economy to run. Suny mentioned that Stalin also linked the need to industrialize rapidly with the dangers that the USSR faced from the great capitalist and imperialist powers. He saw the need, and thus he set up theShow MoreRelatedStalin And The Soviet Union1336 Words   |  6 Pages Joseph Stalin the prominent leader of the Soviet Union had a vision to transform the Soviet Union into an industrialized economy. Through the works of Stalin he implemented â€Å"The Five Year Plan† which included methods and goals that were very important in the arrival of his goal. Though, hard labor, terror, struggle, and work was put on the peasants and kulak class that was key in Stalin’s plans to achieve a Communist society. Through the utilization of terror and repression, Stalin’s Five Year PlanRead MoreStalin And The Soviet Union1700 Words   |  7 PagesWhen Joseph Stalin came into power the Soviet Union was a large and under developed country. Mostly agriculture, a high producer of grain but without industry. Only the capital Moscow had started to industrialize but in a very centralized area in small and slow steps. The Russian people had just been through World War 1, two revolutions in 1917, civil war and famine by the time Stalin took the reigns of the country. All which had massive impacts on the state of the economy. Stalin saw Russia as weakRead MoreStalin And The Soviet Union1796 Words   |  8 PagesJoseph Stalin (1878 – 1953) was the dictator of the Union of Soviet Socialist Republics or Soviet Union from 1929 to 1953. In the eyes of many, Stalin’s rule was a time of terror and suffering. Stalin ruled by fear. Anybody that showed the slightest sign of objection or rebellion against Stalin could be sent away to the Gulags without ever returning. As leader of the Soviet Union, Stalin stopped at nothing to transform his country from a rural society that functioned with outdated and poor toolsRead MoreStalin And The Soviet Union1564 Words   |  7 PagesWith the arrival of the second half of the 20th century, came the death of Stalin and a new age for not only Russia but the entirety of the Eastern Block as well. Russia, as always, stood in the face of adversity and, instead of crumbling, began to develop a nd progress in leaps and bounds. In the span of a mere 50 or so years Russia went from one political, social, and economic standing, (Stalinism) to its exact obverse. Despite the obvious changes a switch like this requires there are still someRead MoreStalin s The Soviet Union900 Words   |  4 Pages Stalin’s â€Å"revolution from above† reshaped the Soviet Union through his many policies including his Five Year Plans, industrialization and collectivization. The Soviet Union was transformed from technologically backward to industrialized. Carter’s view that history is driven from above or from below relates to Fitzpatrick and Bailes’ essays because they show that Stalin’s policies to create a new elite were prompted by the social mobility of the working class. The education of the working classRead MoreThe Soviet Union Under Stalin876 Words   |  4 Pagesfall of totalitarian regimes in the Caucasus countries. The Union of Soviet Socialist Republics (USSR) forms the basis of this analysis because the renowned Soviet Union under Stalin played a crucial role in coining the term â€Å"Caucasus states†. In essence, these were countries in between Europe and Asia that were more of colonized by the Russian Empire. Later, during the Communist era they paid extreme and mandatory allegiance to Stalin and other. In this regard, Stalinism became a movement to reckonRead MoreJoseph Stalin And The Soviet Union2106 Words   |  9 Pagesgreat ally leader of World War II, Joseph Stalin, had committed even greater atrocities than Hitler. Joseph Stalin was a ruthless and yet diligent dictator of the Soviet Union, whose rise to power influenced a multitude of major events in his country’s history. Due to Stalin’s impactful reign, he made the Soviet Union become a global superpower, underwent difficult hardships such as the Great Famine in the Soviet Union, and after his death, caused th e Soviet Union to go through a process known as de-StalinizationRead MoreStalin And Stalin s Theory Of The Soviet Union2062 Words   |  9 Pagesgrade academy 2015-2016 History introduction This essay is about hitler and stalin we make clear what they think of differents terms of ideas they had and make sure if they have the same answers or difference and then we compare what they think about they differents mains. Stalin and Hitler essay: Political ideology(2): Stalin s ideology is interesting and not as clear cut as many people think. In theory, Stalin was a communist, but he was not a communist along the same lines as Marx or LeninRead MoreJoseph Stalin : The Dictator Of The Soviet Union Essay1265 Words   |  6 PagesJoseph Stalin was a former general secretary of the Central Committee of the Communist party of the Soviet Union. Stalin was the dictator of the Union of Soviet Socialist Republics from 1929 to 1953. His Red Army helped defeat Nazi Germany during WWII. On December 18th, 1879, in the Russian peasant village of Gori, Georgia, Joseph Stalin was born. His full birthname was Josef Vissarionovich Djugashvili. He died on March 5th, 1953 in Kuntsevo Dacha. Joseph was buried in the Kremlin Wall NecropolisRead MoreStalin s Leader Of The Soviet Union Essay843 Words   |  4 PagesJoseph Vissarionovich Stalin was born 18 December 1878 in Gori, Georgia and died 5 March 1953. Stalin was the leader of the Soviet Union for over two decades. He was trying to modernize Russia and help to defeat Nazism. Stalin ruled up until his own death in 1953. He was known as a brutal leader who was responsible for the deaths of over 20 million people. Stalin s parents were poor and he had a rough childhood. He later went to become a priest in a Georgian Orthodox Church, but, he was expelled

Analysis Of Jimmy Carter s Presidency - 1440 Words

Jimmy Carter’s presidency is often met with harsh criticism and unfair judgement. He’s been labeled as a man who was â€Å"too smart to be president† but in reality, it was more like he was too nice to be president. Although he was a strong diplomatic speaker, he lacked the assertive nature that prevented him from succeeding in foreign policy. That’s not to say he was without merit but situations such as the Iranian Hostage Crisis have left a permanent blemish on his political career. Carter was in no way a president who sought confrontation. The ramifications of the Vietnam War left him and the American people under a different mindset, one that wasn’t eager to get involved in another overseas conflict. Yet tensions in the Middle East continued rise with both Egypt and Israel at each other’s throats. A more domestic issue arose in the 1979 energy crisis with the number of oil reserves being reduced largely due to the United States supporting Israel during the Yom Kippur War. Ironically, a lot of the problems appeared to have been carried over from Nixon’s time in office. These were the problems caused by a cutthroat conservative and now they were passed on to Carter. This does not absolve the man of responsibility for his decisions but it does provide a viewpoint as to how he was able to overcome global dilemmas. Preceding Carter, Nixon’s administration had encouraged people to buy more home appliances and add an additional car to their driveway. HeShow MoreRelatedThe Presidential Election Of 1980 Essay1442 Words   |  6 Pagesheld. The competition was between incumbent Democratic President Jimmy Carter and his opponent, former Californian Republican Governor, Ronald Reagan. Reagan, assisted by a falling economy complicated by inflation and high unemployment, and the Iran hostage crisis, Reagan would win the election in a sweep, receiving the largest number of electoral votes ever tallied by a presid ential candidate not currently in office. Jimmy Carter, who beat out Edward M. Kennedy for the nomination for DemocraticRead MoreIranian Hostage Crisis 1617 Words   |  7 Pagesunprepared, slow, original, and catastrophic. The reaction of the embassy staff was slow, unprepared and disorganized. Since the revolution the embassy had reduced its staff from several thousand down to less than 100 (Bowden, 2006, p. 19). The U. S. Marines stationed at the embassy were given orders not to shoot, but they could and did use tear gas. When the staff realized what was going on, several had already been taken hostage and they retreated to the second floor secure room and third floorRead More Integrity in Leadership Essay1644 Words   |  7 Pagesthe underlying theme for the theory of self interests. There are two basic formulas that can be used when trying to determine what is moral, and they are: 1.  Ã‚  Ã‚  Ã‚  Ã‚  We should choose the action(s) that we feel, with good reason, will benefit us more than any other choice 2.  Ã‚  Ã‚  Ã‚  Ã‚  We should choose the action(s) that are in our best interests, or that we prefer for the best perceived outcome These two formulas can be implemented when making any decision. If you feel something will benefit you, orRead MoreBill Clinton and Integrity1689 Words   |  7 PagesThis is the underlying theme for the theory of self interests. There are two basic formulas that can be used when trying to determine what is moral, and they are: 1. We should choose the action(s) that we feel, with good reason, will benefit us more than any other choice 2. We should choose the action(s) that are in our best interests, or that we prefer for the best perceived outcome These two formulas can be implemented when making any decision. If you feel something will benefit you, or thatRead MoreThe Significance of Ronald Reagans Tax Reform Act of 1986979 Words   |  4 Pagesoverall decrease of unemployment levels during the last year of his presidency, 1989. Reagan’s Tax Reform Act is analyzed in comparison to other economic and political events taking place during his presidency; the Act’s policies and implementations are investigated and evaluated for their effectiveness in economic recovery, the role of the Keynesian economic cycle during his presidency, and the policies of previous presidencies that lapsed into Reagan’s. Economic Analyses and Historical encyclopediasRead More Rankings of Presidents Based on Domestic Policy and Foreign Policy3318 Words   |  14 PagesRanking by Domestic Policy Rank President Explanation 1 Lyndon B. Johnson During Johnson’s presidency, the federal government significantly extended its domestic responsibilities in attempt to transform the nation to what Johnson called the â€Å"Great Society,† in which poverty and racial intolerance ceased to exist. A previously unsurpassed amount of legislation was passed during this time; numerous laws were passed to protect the environment, keep consumers safe, reduce unfairness in educationRead MorePresidential Election Outcomes From American History2856 Words   |  12 Pagessuch as their own background/history or what party they identify with and how the candidate stacks up with those expectations. Voters can also vote based on retrospective voting, which is basically voting based on a thorough analysis of a candidate (if it is an incumbent)’s past performance. Such past performance takes into account the economy. According to Time Magazine and History News Network, the economy is essentially the only deciding factor for the outcome of a presidential election. In factRead MoreLeadership And Learning Is Indispensable From Each Other, By John F. Kennedy858 Words   |  4 PagesKennedy). These are the words that were meant to come out of his mouth on the twenty second day of November in 1963, they never did. There are many presidents that have reformed education for the better, Jimmy Carter for example, he signed the Department of Education Organization Act(Presidency) which created the Department of Education the nation knows today. It’s time to take past example and try to help the present, the way to improve student outcome is to make sure that the test scores in theRead MoreThe Collapse Of The United States2238 Words   |  9 Pages hitherto flourishing, collapsed. Jimmy Carter, then-president of the US, tried to deal with this crisis but ultimately failed, bringing the American gov ernment almost to a standstill (Ambrose, 1997). The US’ behaviour and actions in Iran following the revolution leads us to consider its role in the failure of their relation. We could therefore ask ourselves whether or not the downfall of US-Iran relations was precipitated by the US, under the Carter Presidency. In order to do so, this essay willRead MoreRichard Nixon and Supreme Court1634 Words   |  7 Pagesrisen to ________ percent per year. 19. During the Korean War, General Douglas MacArthur actions could be described how? 20. In the Korean War, the Chinese threatened a massive invasion of Korea if the United States did what? 21. In the final analysis, the most significant result of the Korean War was what? 22. A major political consequence of the Cold War was what? 23. When Congress voted to end wartime price controls, prices rose ________ percent in two years. 24. The leader of the Dixiecrats

Martin Heidegger Biography free essay sample

The Man who would Create Being Martin Heidegger was born September 26th, 1889 in Messkirch, Germany and died on May 26, 1976 in his hometown. Martin was originally raised and educated in order to become a priest. His local church supported his schooling by scholarship in order that he may attend high school in Konstanz and further. Ironically, it was the pressuring support of the Catholic Church and the friends he later made during his schooling that eventually caused him to defect from the Church to pursue and become one of the most influential philosophers of the 20th century. After graduating from high school in 1909, he spent two weeks as a Jesuit novice, and then being discharged allegedly for health reasons, enrolled at Freiburg University to study theology. However, for reasons unknown, but most likely because of his lack of desire to become a priest, he broke off his studies in theology after only two years. Rather than theology, Heidegger focused his studies instead upon the fields of philosophy, mathematics, and natural sciences. During his remaining years of study at Freiburg, Heidegger worked with Edmund Huserll, a friend who would influence Heidegger’s later works and help start Heidegger’s rejection of Catholicism. He received his doctorate in philosophy in 1913. In 1915, Heidegger returned to Freiburg University to teach as assistant to Huserll. World War I briefly interrupted his work, as he was drafted into the military, but was dismissed after two months, again because of health reasons. Heidegger then began to work on his habilitation thesis in order to capture the chair of Catholic philosophy at Freiburg. In 1915, he was instead appointed Privatdozent, or lecturer. Then in 1917, Heidegger married Elfride Petri, with whom he had two sons and a daughter: Joerg, Hermann, and Erika, although he did have a notorious affair with his student and philosopher Hannah Arendt while teaching at the University of Marburg in the 1920s. Despite this, she never left him. Finally, Heidegger magnus opus was published in 1927, Being and Time, largely influenced by the work on phenomenology by his close friend Huserll, in addition to a few others such as Kant, Kierkegaard, Nietzsche, and Dilthey. However, he considered one particular work to be the highest source of his inspiration, as he says, â€Å"‘[I] read Franz Brentano’s book entitled  On the Manifold Meaning of Being according to Aristotle. ’ By his own account, it was this work that inspired his life-long quest for the meaning of being (Korab-Karpowicz). Considered one of Heidegger’s greatest works, he earned recognition and fame for his questioning of Being. In 1929, he published three more works that further developed his own concept of phenomenological ontology, or the study of being. These were named What is Metaphysics? , On the Essence of Ground, and Kant and the Problem of Metaphysics. The 1930s and 1940s became a time when Heidegger’s practices called into question the legitimacy of his ontology, and this fact is still debated to this very day, and was also a critical turning point in his philosophy. For in 1933, Heidegger joined the Nazi party. Whether or not it was because he approved or he feared the Nazis like most people is unknown. He made ambiguous speeches that could either be interpreted as for the Nazi party or against them. He was appointed rector at Freiburg that same year yet resigned the next year. Yet because of his perceived support of the Nazi party (he never left the party even after he stopped giving speeches), after Germany lost the war, Heidegger was banned from teaching, a ban that was not lifted until 1949. In 1950, he was made Professor Emeritus. During this time interval, his work took a turn, becoming more systematic and obscure than his previous works. He began to write about the â€Å"essence of truth. † He also began to study and lecture on the works of one Friedrich Nietzsche, another German philosopher who believed God was dead. This officially marked Heidegger’s separation from the Catholic Church and his upbringing. During this period of time in which his work took a turn, he published what is considered his second best philosophical work in 1936, called Contributions to Philosophy (From Enowning). Unlike Being and Time, which addresses the Dasein, which is the kind of being whose Being is an issue for it, such as humans, he reiterates the imperative need to abandon subjectivity from his earlier works, but he takes on a different ontology of Dasein, believing that his previous notion of Being links to his critique of subjectivity. As he explains in his Letter on Humanism: The adequate execution and completion of this other thinking that abandons subjectivity is surely made more difficult by the fact that in the publication of  Being and Time†¦ â€Å"Time and Being,† was held back†¦ Here everything is reversed. The division in question was held back because everything failed in the adequate saying of this turning and did not succeed with the help of the language of metaphysics†¦ This turning is not a change of standpoint from  Being and Time, but in it the thinking that was sought first arrives at the location of that dimension out of which Being and Time  is experienced, that is to say, experienced from the fundamental experience of the oblivion of Being. (Wheeler, citing Letter on Humanism, pp. 31–2) The Contributions to Philosophy (From Enowning) was not actually published in Germany until 1989, after Heidegger’s death and at his request. Also a notable difference from his earlier works, most profoundly Being and Time, in Contributions to Philosophy, Heidegger drops his advocacy of the idea that Being can be represented truthfully using pseudo-scientific philosophical language, instead opting for the notion that it is correct to respond properly to Being in language. He is also famous for his critiques of technological thought, which is elaborated upon in Contributions to Philosophy (From Enowning). Often confused with a criticism of technology, what Heidegger is really criticizing is our exploitation of technology as only an instrument invented to benefit a certain group of humans at the expense of others, having witnessed the atrocities of modern technology during both World Wars. This technological thought is an â€Å"us-them† dichotomy of who can kill whom faster, more efficiently, and with a greater magnitude. His later life becomes less eventful than his previous years, as he diverted more of his time to lectures than writing. All in all, Martin Heidegger wrote over 45 books, gave over 44 public lectures, and gave about 15 official private lectures throughout his lifetime. He also became a member of the Academy of Fine Arts at Berlin, member of the Academy of Sciences at Heidelberg, and member of the Bavarian Academy of Fine Arts. He was named Honorary Citizen of Messkirch in 1959 and won the Hebel Prize of Baden-Wuerttemberg. Before his death in 1976, he gave one of his final interviews in 1966, called Der Spiegel, translated as â€Å"Only God Can Save Us. † In this interview, he attempted to justify his political involvement during the Nazi years. He died before he could complete his final work, the Gesamtausgabe, an enormous anthology of all of his works. The project has been taken up by Vittorio Klostermann, Frankfurt am Main and, though it is still not complete to this day, is expected to fill about 100 volumes. In conclusion, Heidegger’s work and his theory of Being were all results of those that supported him and his own drive for knowledge and fulfillment, for if it were not for his education and teaching experience thereafter, the world might have been deprived of one of the most ground-breaking philosophers of the 1900s and perhaps in history.

Tuesday, May 5, 2020

Occupational Therapy free essay sample

My personal reason for this occupation is highly based on my children who currently are diagnosed with ADHD. They are currently undergoing treatment with a Psychologist and Occupational Therapist. The daily duties for an occupational therapist would be to assist patients with rehabilitative activities. We provide a client with a treatment plan to outline their development and monitor their progress. An occupational therapist would interact not only with patients but also with fellow occupational therapists and doctors to better assist and complete goals set up for our patients. What I would like the most would be working with the patients making sure we are focused on their needs. Challenging not only the patients but myself as well, making sure to develop their mental and physical skills. What I would least like about my duties in my career would be working with the doctors, I feel they would be highly anxious and might not have enough patience with patients. Entry level salary for an occupational therapist ranges from an annual rate of $50,250 to $70,500 with an hourly wage of $24 to $50. As for myself, would like to receive about $25 an hour depending on what level of practice you are. The amount that I stated would help my family and I live comfortable not in a paycheck by paycheck. Yes, there is room for advancement or promotion. An Occupational Therapist Assistant can advance to a full Occupational Therapist and then to up to a Director of Occupational Therapist. Therefore it will be up to the person on how much they want to advance. Occupational Therapist start off with an associate degree in the occupational therapy assistant program to which you are introduced to healthcare, medical terminology, anatomy and physiology, and psychology. Eventually furthering my education into a bachelors and then a masters degree in occupational therapy. Within this time an occupational therapist is introduced to the medical administrative aspect of this field. If I am to reach my goal I must continue my education here at South Texas College to receive an associate’s degree, then continue my education at a University to be able to receive a bachelors degree and eventually a masters degree. The way I plan on paying for my degree will be working in a job that I am passionate about which would be in the medical field, while still enrolled in school to reach my goal of being an occupational therapist. The type of person I believe it would take to succeed in this career would be a compassionate, creative, patient person to be able to handle people of any age with any type of physical, emotional, and developmental need. This person must have a sense of compassion and understanding to make sure to keep their involvement with the development that a person needs. They must also be creative to be able to make sure that the person they are trying to work with has an easier way of progress thru their development. And lastly the person must have patience this is the number one key on making sure that they take the time and make sure that the patient truly develops a change within themselves. I feel that I am that kind of person, with all the trials and tribulations that I have endured with my previous jobs and my children’s rehabilitation. I have learned compassion by making sure that I am there for my children and the people that I work with. I have become creative by making sure I teach my children and my fellow coworkers ways of making their learning or their work more fun. Finally I have learned that being a mother with children that have ADHD I have to have all the patience in the world, because they must learn at their own pace and at their own time. The most interesting and positive information has been the ability to create a change in a persons life. In which I know that I have stimulated to think and develop a part of themselves either lost or forgotten. I have also seen the advances in medicine and it has interested me in learning what other forms of change can we provide a person who need that physical, emotional, and developmental need. The most negative and disappointing information has been knowing that I will have to go to a university for 6 years to be able to reach my ultimate goal in having a Masters degree of Science in Occupational Therapy. I have to go thru various courses that I feel have nothing to do with my goal of occupational therapy. I will however go thru the years to make sure that at the end of all my courses I will be able to help people and my children aswell. I will move closer toward my career path by keeping up with the courses so that I am able to pass and complete my goal of becoming an occupational therapist. Once I receive my degree I will make sure to enter a rehabilitation center and be able to focus myself in helping patients. This will make sure to open doors to working not only with adults but with children also, this is where I will learn the creative side of occupational therapy. Overall my goal of occupational therapist will allow me to better educate and develop myself and also my children’s lives. The research and interview has told me that ultimately by becoming a certified occupational therapist I will have the ability and knowledge to help my adults and children develop the skills that they are lacking. Also it will help me provide the adequate care and assistance to understand my children and help their development with their ADHD. I fell that I have made the correct choice for my career due to my personal experience. The career path I have chosen will encourage those with physical, emotional, and developmental disabilities be able to lead a normal life. This will also help create stability in my home with my children and myself, since I will learn to better understand them. Information Interview Name of Person Interviewed: Vicky L. Carol Date Interviewed: March 19, 2012 Organization and Official Title: Super Kids Rehabilitation and Certified Occupational Therapist Assistant. Length of Employment: 8months / 27years total 1. How did you decide to enter this field? She enjoyed helping people with disabilities. After being in employed in a nursing home she was giving an opportunity to go back to school and get educated. At the time it was not required to have a degree in her field if she planned to say in the nursing home. 2. What kind of education and training do you have? She went to college for two years and was accepted in the program for occupational therapy. She did more than three hundred clinical hours. 3. What are your activities and responsibilities on the job? She with lots of on hand activities and physical therapy with children mental and physical disabilities. Also handle lots of state related paper work. 4. How and by whom are work decisions made that affect you? Well she has director that delegates all the duties in the clinic and when it comes to her patients the decisions are made by her. 5. What do you like most about your job? Least? She loves to come to work and be with her patients and seeing their progress. The least that she likes about her job is when the children have to leave the program. Also when the parents to take the time to see what their children doing in there activities and being used as a daycare. 6. How much influence do you have over decisions that affect you? One hundred percent when it come to her patient. But in the work environment the director has decisions on what is need to be done. 7. What do you find most difficult about your job? The work hours, not enough energy, and not enough time with the patients. 8. What about the job would you change if you could? The amount of time with the patient instead of 30min to 35 min it would be at least 45 to an hour instead. 9. What sort of person do you have to be really good at this job? The person needs to be flexible, organization skills, and lots of patients. 0. Is there any specific advice you would give to a person entering this field? This is the best career in the world, be professional, never be involved in the office politics. 11. Where do you expect to go from here? Well after 27 years in the business I will be retiring and on the beach somewhere. But this where I want to be with my patients and noting more.