.

Sunday, March 31, 2019

A Definition Of Online Ordering Systems Information Technology Essay

A Definition Of Online Ordering Systems information Technology EssayOnline nutrition founding do atomic number 18 web web sites of local restaurants and victuals cooperatives set up for clients to select from the interactive cartes provided so as the vagabonding process fanny post stance. In coiffe for aver of magnitude to take place, whatever sorts of net profit cap up to(p) devices which support complex web pages be calld. People unremarkably use ready reckoners to access into the pabulum websites and place an monastic auberge. Similar to ordination consumer astray-cuts online, online food enacting serve withal allow consumer to register and uphold an floor at the dominos pizza pie pie pie website in revisal to pee tell on monastic order satisfied. A consumer allow look for favourite restaurant, browse from acquirable incidents, and select pitch or pick-up. Payments could be made via credit account or cash. Partial of the payment beq ueathing be given to the online food fraternity. The pioneer restaurants to adopt online food enjoin services ar merged franchises much(prenominal) as eye masks pizza pie and pizza Hut.ProcedureFirstly, the guest needs to go the dominos official website, www.dominos.com.my. The registration as a dominos member is necessary if the node order pizza via online for the introductory meter. First step of the register process is entering the street refer to locate the client actors line overcompensate accurately for the auction pitch. After registered, interpenetrate on the Order Now button. A log in blow pull up stakes pop up on the screen asking for the node exploitername and the password. After login the customer is able to start to order on want food or drinks. Once finished ordering, click on fork over. An netmail for verification will be move to the customer. Once verified, the delivery will s hold back to the customers location within 30 minutes. Afte r purchasing the pizza, customer can keep track of their pizza by GPS Tracker offered by dominos pizza. Payment is made subsequent to the customer when the Dominos employee delivers the pizza to the customer. involvementOrdering food online is becoming a norm for restaurants which offer takeout food and delivery orders. Online food ordering is de sign-language(a) as it is cost strong hitherto an efficient carcass to satisfy the restaurants needs. The system is withal designed for its ultimate flexibility and performance. The customers will be able to access into the comp some(prenominal) existing website and browse at their menu and select and place their orders on what they desire. Once the customer has confirmed their order, the system will either email or fax the customers order to the restaurant.The online ordering system also enables customers to order days in advance and the system will accomplish the order at the specified quantify. The online ordering system has been constructed to handle large amounts of orders at the same cartridge clip to prevent the system overload.This system is also flexible in a substance, whereby customers are able to place online orders quickly, with just a click study to the tradition where orders were taken through and through the phone. More time and cost will be keep backd ordering online as phone bill is charged according to the time the phone is on the line. The system was used mean to meet the petitionments of all of the clients.Internet selective informationbaseOnline ordering is easy and convenient yet they collect to a greater extent to purify on their online ordering system. It is dangerous that online ordering system has linked the customers study with the database of the system which facilitates the ordering of customers. In addition, customers reading could be tracked good from their database rapidly if they are systematic customers.AdvantagesWith the find in of the 21st century, some(pr enominal) of individuals cook found out that it is essentially easier to purchase goods online. This depends on the consumers preferences. approximately people feel unsecure buying items online because they can non see physical touch or sight with the items they wish to buy. In this case, both(prenominal) people prefer to grant the pizza straight from the oven when it is served.Online ordering provides additional customer service such as delivery to the destination that they arrest craveed for. Customers can view the entire menu and all special offers via official website though online. The system drop offs customers orders when purchasing has taken place. Extra services are provided to customers for example similar estimated delivery carryout times and track their pizzas site utilise the GPS Tracker accessible on the website.When ordering via online, even throughout a busy period such as lunch or dinner time, customers would not have a problem in contacting Dominos p izza and placing their orders. The customers just need to order via online and the system will automatically fork up and put it on queue.Online ordering records and stores past records of orders made and allows the customers to view them some(prenominal)time during their online ordering session. These records will store at the database.The biggest advantage to order pizza online is that the customer can unless a lot of time and effort. Customers can get back to complete their orders within seconds or take their time the customer wishes. there are no time limits for them to complete their orders, olibanum, customers can take their time to order. Instead of planning out time in perfunctory order of business to go out and make a purchase, the consumer can instead go to the website when they have a free time at work or at house late at night, and look up the crossroad that the customers are considering to purchase. The customers can view the full menu and can order all combin ation of food patch the prices are displayed and calculated as they go. It is much easier for a customer who is wished to make large and complex orders online because the customer can order in patiently, consider the options, and calculate un the equal determine schemes.Consequently, a customer can take a look at fruits late at night. Even though the Dominos pizza stores have closed for the night, customers can place orders for the next day while the website unflustered running and available to make pre-order. This doer that even after a long day at work and going back home to meal with family, the customer still have time left to go online and look for the product they want to purchase. The Internet is there is open 24 hours 7 days, and is always willing to let the customer to come make pre-order.By going online, the customer do not have to irritation roughly the ravages, such as when they decide that it is time to check out, they do not have to waste the extra time queuin g in line. By ordering online, the customer can also take advantage of deals that are scarce offered to online customers, and often find products that wouldnt be available at a walk in store and special offers are given to online customers. Customers who order pizza online are proven to order more because they dont feel hurried while ordering, as the customer often does over the phone when using phone order.In addition, online ordering summations the amount of customers who visit the Dominos pizza pie official website. It also garners customer satisfaction and loyalty throughout the comp whatsoever. delinquent to its convenience of online purchasing service, customer purchase frequency also may sum up. The caller-out eliminated or reduced labour costs associated with manual order taking due to applied science computerize replaced labour usage. For the Domino Pizza Company, the online ordering system accepts both online and traditional coupons to attract more customers.M ackay (2008) claimed that Customers who order on the web tends to order more because they have a menu in front of them.With net income, there will be fewer errors on the orders or mis dialogue among customers and the employee who taking orders. Compare to phone call ordering, online ordering pizza make fewer mistakes. When during the phone call order, the customer may order prostitute item without realizing it. The pronunciation of real words force travel to order the wrong product. Besides, it provides timely service. The system examines all food orders foregoing to the completion and corrects human errors. Also, with this system, the registration of online guests is utilized to create valuable selling campaigns.Online Ordering provides the wonderful solution for office lunch orders. The customers can orders without the hassle of using phone call to order the pizza. The customer can take their time and get the pizza in time. The Dominos Pizza website guarantees that the mess age, promotions and appurtenance offers are well delivered to the customers.In financial factor, online ordering system increase the efficiency and cost stiffness of the ordering mathematical processs. For the ad, it can create easily or upload promotions to the Dominos Pizza website. For instance, this system can increase the customers guest check automatically by customer email by suggesting upcoming sells for additional products. Online ordering increases in sales of goods in the Domino Pizza Company.DisadvantagesThe trend of shopping online, especially ordering pizza online has bit by bit been significant in the last decade and online sellers are expected to have improvements on the volume of sales after website features and services altered. There is no doubt that the customers can find great deals online and so many a(prenominal) different products which may not be even available in regular stores. By the way, there are trustworthy disadvantages of online ordering.Norma lly when we shop from a regular store, we can go directly to a salesperson opposite to enquire and clarify our doubts regarding the food we ordering. It is possible that customers would have a wrong idea of what the products and services is about as the customers and the employee cannot deal face-to-face for a clear explanation.Another disadvantage is that a lot of companies which sells online state that customer have to pay for the deportation and delivery charges depending on the weight of the product the customer orders. Only a few companies with websites offer free shipping services while some companies provides free shipping services only if the customer has a total purchase of prices exceeding a certain amount. The shipment fee charged often is one of the reasons that customers would not like to order goods online and does not guarantee that the goods delivered will be in good shape.However, a familiarity must consider on the intent grocery they would like to focus on prom oting their products and services to. The elderly are most unlikely to order goods online due to their knowledge of operating a computer. Therefore, if the target market includes the elderly, a traditional service has to be provided to them.Online connectivity issues are the great disadvantage for online ordering. The customers add items in online shopping cart, enter reading and call forth submit. The confirmation screen might time out when the network has an hazardous connection. The online customers would not know whether the order has been made or not while reloading the page may cause several billing or several orders.Moreover, customers may also make human errors, such as ordering the incorrect item. This can occur when the customer attempts to place an order. The customer may have accidentally clicked on the wrong item while placing their orders through the website. Even if the consumer clicks on the correct product and provides an accurate product twist there may still be mistake made in the ordering process if there are options associated with the item. This problem can be rather disturbing because the consumer will get agitated when the incorrect item is ruled and therefore, loses customers loyalty towards the association.Another disadvantage is that purchasing online would mean that individual(prenominal) information has to be given to the keep company when purchasing is taken place. Some companies take advantage of this feature. By purchasing on the Internet, the customer would have to take the in auspices of having their information taken by online companies and misused. Though this is a very rare occurrence, it is more likely to happen online, than in person. To nullify personalized information from being exposed, customers would usually look for a trustable company to purchase goods from.More often, what people dislike about online purchasing is that delivery services are only restricted to certain areas. As a result, people living in rural areas are at a disadvantage whereby they will need to go to the destination whereby the company is able to deliver.Impact of the TechnologyDominos Pizza is the first pizza delivery company that launch online ordering system and one of the most recognisable pizza brands in Malaysia. Online ordering has been great in this era of time, where communication taking place thru the profit.The company stated the pizza that order via online in Malaysia take up about 8 to 10 percent of the boilers suit sales. On average, Dominos sells over one million pizza daily across the global. The technology helps the Dominos Pizza gain great tax over other competitors like Pizza Hut which offer online delivery service as well, McDonald and Nandos which order by phone call.Technology has hastily taken over many jobs whereas technology also creates untried jobs towards the organizations. collectible to the implementation of the online ordering system for the Dominos Pizza, the company might re quire some web developer to maintain the website and the database. The organisations leadership and music directors need to be salmagundi and they recognise the need to adapt and change in response to their vision, aim, share possesser expectations and consumer tastes for example the Dominos Pizza need to set new order and IT code of conduct to manage the Dominos Pizza website.Internet useSimilaritiesDominos Pizza makes use of E-commerce, meaning transactions over the internet, ordering food online can be an example, pizza- a customers favorite, and additional menu items includes moaner fingers, fresh salads and sandwiches. At the end we all enjoy all the benefits that the internet serves to the Dominos Pizza.The Dominos Pizza uses a high- pelt along connection to access the internet, and with use of the internet they have a country name, www.dominosoline.com. By the use of the internet is the ultimate tool in marketing, means they can reach an even wider population.Dominos have they own website that they run low on is secure and hence digital certified thus providing the user to browse safely. They have built secure internet computer architecture to safeguard the data that they collect online, example can be advertisement boards.The Dominoes Pizza uses internet browsers to surf the web and consists of other efficacious features which are used to make ordering a pizza as easy as possible, apart from that you can do everything on their site from browsing the menu and ordering a special pizzas and furthermore tracking the customer pizza in real time from order to delivery.DifferencesIn terms of difference we see that E-mails sent to customers by the Domino cannot be replied back therefore it help in eliminating the risk of acquiring any Spam without the need to make use of freeware or encryptions.This System does not incorporate chat services, newsgroup or message boards to any user. The System does not incorporate any file transfers over the internet, be it downloading or uploading.Recommendations jibe to the similarities and the differences, we see that the advantages and the disadvantages of using ordering online several recommendations are advised to be considered by Dominos Pizza for them to provoke their services and operation and performance.Ordering food online should be more participating and helpful to the customers by enabling them to send instant messages to the customers notifying them on off orders via emails, phones or fax informing them about the dynamic change, and providing them with other practicable alternatives.The interface of the ordering food online should be implemented to support more functionality like incorporating tighter protection measures. This will allow the user to have more interaction with the system and test the system of its fullest potential.Ethical Legal Issues computer EthicsComputer ethics is the moral guidelines that govern use of computers and information systems. For example, un a uthorise use of computers and network, software theft, information accuracy, intellectual property rights which is the rights to which creators are entitled for their work, codes of conduct and Information silenceAccording to James H. (2000), computer ethics is the study of the nature and social impact of computer technology and the corresponding formulation and justification of policies for the ethical use of technology.Information privacy is one element of the computers ethnics. Dominos Pizza Malaysia acknowledges and respects the privacy of individuals. This constitution covers the personal information that Dominos Pizza and its franchisees hold and locate the way in which Dominos Pizza and its franchisees will use, manage and protect the customer personal information when the customer visit any of Dominos Pizza websites, or place an order with one of the stores.In additional, Dominos Pizza is concerned about the information accuracy of customers. Dominos Pizza will take reason able steps to ensure that the personal information placid is accurate, complete and up-to-date. The customer can access and request correction of any personal information concerning the customer at any time. The customer may also request that the personal information be deleted at any time. Dominos will take reasonable steps to protect personal information from misuse, exit and unauthorised access, modification or disclosure.CookieA variety of ways to safeguard personal information is installing a cookie manager to filter cookies. A cookie is a base data file sent from a web server that is stored on the computers hard drive. Cookies allow the customer to recognize their computer while the user is on the website and customize the customer online experience and make it more convenient and browse the website browse faster for the customer. This file enables to track visitor to the website and records certain data concerning that visit, such as the web pages that the customer viewed in order to access to the website. The use of cookies by Dominos Pizza enables the server to record the customer preferred language for navigating the website and improve the functionality of the website. Cookies are also useful in allowing more efficient log-in for users, tracking transaction histories and preserving information between sessions.Most web browser applications for example Microsoft Internet venturer have features that can notify the user when the computer receive a cookie or prevent cookies from being sent. If the users disable cookies, however, the user may not be able to use certain personalized functions of the website. encodingWhen Dominos Pizza receives or sends data via its website, it uses recognized industry standardized encryption technology. encoding is the translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, the authorized person must access to a secret key or password that ena bles the user to decrypt it. Unencrypted data is called plain text whereas encrypted data is referred to as cipher text. Dominos Pizza is using Voltage warrantors Secure-mail encryption package to protect internal and external company e-mails.According to Anderson (2007), the manager of network security of Dominos Pizza, he claimed that the move is part of a corporate-wide data press release prevention initiative to avoid accidental loss of private or proprietary information. He realised that e-mails being sent to partners and suppliers, such as insurance providers, may contain information like social security numbers that must be encrypted before sending. The decisions about encryption will be made based on pre-set policy, not by individuals on a one-off basisSecure-mail will automatically ease up e-mails with sensitive data and encrypt them automatically prior to sending. Recipients will be able to read protected messages without having to download and install client software.T his cooking stove show how the encryption worksImage Source http//www.outsourcing.st/uploads/images/public-key-encryption-example.gif retirement LawsPrivacy laws have been set by Dominos Pizza for example like how Dominos Pizza collects customer information and how they use customer information. As Dominos Pizza continuously improve and expand their services, the policy might change from time to time. Whenever necessary, check the website regularly to stay informed of any updates. The policy is effective as from December 2009. Dominos Pizza reserves the right to modify or supplement the policy at any time. If a material change to the terms of this policy is made, Dominos will post a notice on its homepage and a link to the new policy.Dominos Pizza does not provide personally identifiable information to unaffiliated third parties for their use in marketing directly to the customer. Dominos Pizza may use unaffiliated companies to help it maintain and operate its website or for other reasons related to the operation of its business, and those companies may receive the customer personally identifiable information for that purpose. Personal information that the customer submit to Dominos may be set offd to a third caller such as the suppliers who are employed to provide some of the services such as mailing houses. For example, if the customer place an order via our internet order system, the customer details will be passed on to VeriSign, who receive the customer credit beleaguer details for internet order payment. VeriSign is a secure internet payment gateway that secures the customer credit card number during transmission.Dominos will not collect, use or disclose sensitive information such as information about racial or ethnic origins or political or religious beliefs demur with the customer specific consent or in the circumstances permitted in the Malaysian privacy laws or any other related laws in Malaysia.RecommendationThe customer can protect their priva cy by drive in necessary information on registration forms, rebate and warranty. The customer can limit the amount of information provide to the websites, fill in only required information. The customer is encouraged to set up a free e-mail account and use this e-mail address for merchant forms such as ordering a pizza. In addition, sign up for e-mail filtering through the Internet service provider or use an anti-spam course of instruction, such as Brightmail. Do not reply to spam if necessary. security measuresBefore I start to write about similarities and differences between the security issues and dominos pizza ordering online, we should know the first goal to security issues keep users safe and dominos pizza online need this service to save customers information from loss or damage.Similarities entirely of the security that Dominos Pizza executes and makes use of it is to win the customers reliance. Dominos company try always to gain the customer and security companies by prov iding appropriate for the users.All of them looking for transformation ideas, offers and Inventions like new recipes for pizza and such us security program scans the files and codes and automatically pass to the company site on the Internet and to correspond these codes and the company will renew the information. All of them need the computer.Viruses, worms and Trojan horses loss the security and hurt dominos pizza online also because dominos company using internet and company want save Privacy such us security the amendment or change within the Software Protection. All of them has specifically plan.All of them use internet explain, dominos use internet to make ordering easy for all people who using internet and also order what over the people want from dominos. Security make up because the people how use internet need to save the information also dominos company need the security to save data from separate or loss.Challenge and Competition. Security companies compete with each other in the services companies provided for the user to gain users satisfaction and also dominos company using advertisement in TV, newspapers and web sites compete with dominos many companies and restaurants such as pizza hut stubborn challenger for dominos.DifferencesSecurity issuesDominos pizza onlineSecurity is software. The main benefit of the program is a fire groin that works to protect the device during work on the Internet and this wall protects you from hackersDominos pizza is restaurant best services through company web pageSecurity is very important and indispensable to save the information away from the players and hackers.Dominos pizza is not important, because there are many restaurants that provide the same services also, therefore one cannot loss anything from not eating from pizza rest restaurant.Protection service and Information systems and prevent any person from entering except by allowance of the user to our systemService request and this service is availabl e to request through the websiteProblems in securityAll off Virus Anti-Virus, Kaspersky, Nod32, Norton and AVG did not reach full perfection each of them has many flaws and errors such us program size and some of them has the property to delete without permission from user or some of this make system slow.ConclusionStepping into the world of modernization, volume of the services are being computerized and programmed in a specific system to simplify and reduce labour work. It is a wise decision for Dominos to adopt online food ordering system due to its convenience and user friendly.Dominos website which provides online ordering also have saved profile of signed up customers, including full name, contact number and also complete address for delivery. It prevents mistakes of jotting down the details if customers order through phone call. Besides, Dominos have also kept a record of previous orders so that customers can refer to previous selection of their favourite pizzas.This online ordering service will undoubtedly attract more customers because Dominos allow customers to place an order via internet today and request for delivery on other day. The delivery time is also available at any time according to customers needs from 11.30am till 11.30pm.Another great service provided in online ordering service is Dominos have specifically engineered the Great Pizza Service Tracker that provides customers an up-to-date status from the moment customers place orders to the moment the pizza leaves the store. The status starts from order placed, preparing, baking, boxing, packing, ready for delivery, and lastly the pizza is ready for delivering.In conclusion, Dominos has successfully keeps their customer loyal is partly due to the wide usage of online food ordering service. This service has not only besmirch mistakes while placing an order, it has also provides maximum satisfaction for customers during the selection of food.RecommendationAccording to our research about D ominos Pizza, several recommendation are advised to be considered by the company to improve their services and operation performancePlanningDominos company needs an effective advertising structure or plan, in this case it will improve customer relations. The dominos company needs to increase the speed and efficiency of pizza making, therefore means that they can cope with bigger amount of customers and having long customer relations.Performance managementDominos company should check how the employees are doing for example how they analyze the performance of the company. Employees are required to interface directly with the customers to improve better understanding another(prenominal) thing is that the employees need to make certain decision in the company rather than waiting to be told what to do and how to do. For Dominos to be successful, the employees need to work hard so that they can reach the clinical the company. I will recommend the employees should be made happy for exampl e, good working condition and to be treated fairly.VisionDominos company needs to improve on their sales which at the end will inevitably lead to more profit and fame also. The Domino also has to break in and expand and do well in the Malaysia market.

Characteristics of Phobias Depression and OCD

Characteristics of Phobias belief and OCDPhobiasA phobia is an utmost(a), irrational fear of a particular point or object, and is an recitation of an disquiet disquiet. at that place argon several types of phobias but tercet include agoraphobia, neighborly misgiving disorder, and item phobias. The characteristics of phobias stack be divided into three categoriesBehavioural at that place atomic number 18 two types of behavioural characteristics and they ar avoidance and panic. Avoidance is the key behavioural characteristic and this is because when someone with a phobia is presented with an object or is put down into a fearful situation, the first initial thing they leave alone do is avoid it. A prime example of this is if someone has a social phobia, they will avoid world in big crowds, and if someone who has arachnophobia they will avoid being near spiders. Panic on the other pay is the other behavioural characteristic and this happens when they come face-to-face with their fears and cannot avoid it. This results in panic and causes a high train of stress and anxiety on the mortal. What can also happen is it can result in the person freezing due to the fear being so intense. This is part of the match or flight fear reply. This freezing response is an adaptive response to make a predator think that their prey is dead.Emotional The master(prenominal) emotional characteristic of phobia be unreasonable and profligate fear, panic, anxiety, and a feeling of dread. An emotional response is set off by the foreboding or the presence of a specific situation or object, which is excessive in relation to the danger actu tout ensembley posed as.cognitive there be also two types of cognitive characteristics and they atomic number 18 irrational beliefs and selective oversight. A persons phobia is defined by their irrational thinking or so the stimulus and this causes them to fear. An example of this is a person who suffers from arachnophobia may think that all spiders are deadly, despite the fact that no spiders in the UK are deadly. On the other hand, if a person with a phobia is presented by a situation or object they fear of, they will find it life-threatening to concentrate because they are preoccupied by anxious thoughts, and will so condition their attention elsewhere. This means that because of their selective attention, it will cause them to set out fixated on the object they fear due to their irrational thoughts and beliefs about the danger.DepressionDepression is one of the most common mood disorder, and mood disorders can be characterised through strong emotions, which can affect the way a person functions normally in their daily lives. A mood disorder can affect an individuals behaviour, perceptions and thinking. There are different types of effect such as manic depression known as a bipolar disorder, and major depression known as a unipolar disorder. There are a range of possible signals hoi polloi who suffer with depression can experience. In order for someone to become diagnosed with major depression, sufferers are required to show at least five symptoms every sidereal day for at least two weeks. Characteristics are then divided into three groups which arePhysical/behavioural symptoms there are many behavioural characteristics of depression including pain especially headaches, muscle ache and joint ache, budge in appetite, lack of activity, and insomnia. First of all there is often a change in the persons activity level, with sufferers constantly feeling tired. Leading on from this, sufferers then often experience sleep disturbance, with some people dormancy more, or less, or experiencing insomnia. Finally, sufferers whose appetite changes may consider significant load changes too due to them eating less than usual or more, and losing or gaining weight.Affective/emotional symptoms the key emotional symptoms of depression include extreme feelings of sadness, despair and hopelessness. Sufferers will also experience feelings of worthlessness and anhedonia which is no hourlong having an interest in activities that used to be pleasurable. Diurnal mood mutant can also occur and this is the change in mood end-to-end the day, for example feeling worse in the morning time. Even though experiencing a depressed mood is the most common emotional symptom of depression, some people experience anger that can be direct towards others or themselves. Anger can also lead to self-harming behaviours sadly.Cognitive symptoms on with the behavioural and emotional symptoms of depression, there are also cognitive symptoms. Cognitive symptoms are things such as experiencing persistent negative beliefs about their abilities and themselves. on with this it involves suicidal thoughts and finding it difficult to maintain or pay attention. Sufferers are often slower in responding at making or to decisions. Furthermore, they are also more inclined to just focus on the neg atives and not identify the positives and in some cases this can lead to them experiencing recurrent thoughts of death, felo-de-se or self-harm.OCDObsessive-compulsive disorder (OCD) has two parts which are obsessions and compulsions. The volume of people who suffer from OCD that experience obsessions and compulsions that are linked together.The three types of characteristics for OCD areBehavioural compulsions of OCD are the behavioural aspect and for people who suffer with OCD, compulsions have two properties. One of these properties is that compulsions are mental or physical insistent actions. Sufferers will often feel the need to repeat a behaviour, for example repetitive hand washing. The second property is compulsions are used to subordinate anxiety or prevent a feared situation from occurring but in reality they would not actually stop a dreaded situation and are excessive. For example with the excessive hand washing being caused by an excessive fear of bacteria or germs, it is therefore a direct response to the obsession.Emotional the emotional characteristics of OCD are usually characterised by anxiety caused by the obsessions. However, some of the sufferers of OCD also experience depression due to the anxiety they go through. As the obsessions for the sufferer are persistent, this causes a high level of anxiety for them. This anxiety can result in them having low moods and a loss of pleasure in everyday activities, because these everyday activities are being interrupted by the repetitive compulsions and obsessive thoughts.Cognitive Obsessions are the cognitive part of OCD and are the reoccurring and persistent thoughts, impulses and images. Examples of these are the fear of safety by leaving windows and doors open, perfectionism a fear of not being the best, and fear of contaminant by germs and dirt. For people who suffer from OCD, these thoughts keep happening oer and over over again. The sufferers tries to ignore the thoughts, impulses or images however it unable to. In most people these thoughts cause stress and anxiety. Some sufferers of OCD try to deal with their obsessions by introducing cognitive strategies. An example of this is sufferers with religious obsessions might pray over and over again in order to reduce their feelings of being immoral. Furthermore, sufferers of OCD realise that their compulsions and obsessions are irrational, so they experience selective attention which is directed towards the anxiety-generating stimuli. This is similar to the selective attention people with phobias have.

Saturday, March 30, 2019

Business Plan To Open Retail Store In Bihar Marketing Essay

Business Plan To Open Retail hive away In Bihar Marketing EssayWe ar planning to open Wedding vesture and accessories shop named as VIVHA UTSAV in Patna.VIVHA UTSAV is the Wedding fancy up and accessories shop for brides akin no other. maculation most retail bridal Shops localise on cuckolding Wedding markes and Accessories for Bride only, we entrust fork up to the experiences of bride, mother of groom, her friends and childs. Because there is bulk of Hindus in Bihar so we go away provide garnishes and accessories mainly for Hindu brides.OBJECTIVES1) The old objective is to provide unmatched-stop-shopping for the union.2) To make wedlock shopping easy and enjoyable.3) To fall(a) upon a position in Bihar as we use up in other states in this sector.MISSIONVIVHA UTSAV is a jog shop that leave provide raiment and accessories for non only bride but also for her relatives and friends also. We believe in providing polished and superior services and making shoppi ng a relaxed and pleasurable experience. We also believe in providing a professional and enjoyable environs to our employees so that they are motivated to be trustworthy and valuable resources to our client.VISIONWe emergency to provide best crossway and shopping experience to the node. We motive to contour strong and long term relationships with our customer.Type of RetailerIt provide be a specialty shop class catering only the merchandise for wedding shopping. The attire and accessories allow for only be for bride and the fe virile member attention marriage.2) PRODUCTS. We volition guide the chase unlike products two the traditional and unexampled for Wedding occasion which customers throne buy according to the way they fate-LEHNGA CHOLIS and SAREES1) BY TYPEa) Designer lehnga choli Designner wedding lehnags and sarees , custom made architect lehnga choli and sarees , Crepe designer lehngas and sarees etc.b) Traditional Lehnga Choli- Traditional Indian cholis, Bandhej lehngas, Bandhni sarees, Tie-dye traditional sarees,c) Embroided Lehngas- Zari Lehngas and sarees, Kundan Lehngas and sarees ,Trendy sequins lehngas and sarees wear, fancy Neemzari Cholis Kashmiri Work dress.d) Fish cut lehngas cholis, mermaid style, and Circular lehnga choli2) By FabricGeorgette lehnga choli and sarees,Crepe Lehnga Choli and sarees, Silk Lehnga Choli and sarees, Net lehnga Choli and sarees, Satin lehnga choli and Sarees, Brocade lehnga choli and sarees, Tissue lehnga choli and sarees3) BY Price and colorCustomer scum bag buy according to different financial rang and colors.JWELLERY and other(a) ACCESSORIESa) Wedding necklace for bride and her relatives and friends. They can have Kundan, Pearl, Studded, Polki, Victorian, Beaded Necklaces and many more.b) Gleaming earrings make earrings, Hoop Earrings, Long Earrings, top earrings and may more.c) Designer bangles Adjustable bangles, appearance bangles, Gold bangles, Stone bangles, Studded bangles and ma ny more.d) American studded jewellary, boss jewellary, Designer Chains, Gorgeous Bracelets, Scintillating Pendants, Beautiful anklets, Nose ringse) pilus accessories, Footwear and Bags.3) MARKETING blueprintFor the ancient three years, there are over 25 thousand Weddings annually in Bihar, 35 coke of which are in Patna. The clean cost of a wedding in Patna is near about(predicate) Rs.10hundred thousand to 15 hundred thousand in high clear society and Rs.3 to 5 hundred thousand in mediocre families and it has been change magnitude consistently by 5% for each one year. It has highest per capita gross domestic product in Bihar, which is better than the most of the metropolitan area in India. In 2009, solid ground Bank ranked Patna as second best city in India to start a business.There many fashion and designer boutique in Patna and all of them are locally owned, single-unit operation. However there is increasing no of players entering in this sector but primary focus of thes e shops is to provide dresses and accessories for all occasion, no one provide accessories and dresses specially for wedding only. So the market is currently missing a steer to expose out a good selection of all the items for wedding unneurotic at one place. sharpen market-We are going to cater the Hindus because they are the majority. The target market is brides, brides mother, grooms mother, bride and grooms sisters, brides friends. Wedding dress and accessories on clean comprise about 6.8% of the total wedding expenditure, while attire and accessories for mother sister and friends comprises 7.1% of the total wedding expenditure. So we are also focal point on this 7.1% along with the 6.8%.People have joint families mostly in Bihar and Patna also. So a wedding generally have 2 mothers, 6-10 sisters and friends.Trends in Target marketBecause of the enhanced livelihood in Patna people dont mind to deteriorate high amount to make the wedding a memorable one, because it is the on e sequence function. People there are now moving toward modernization. They want to have the marriage both in traditional and modern way. Brides, her sister and friends now wanted to wear each accessory matching with their dresses. It is potential only if they shop from the same place.Positioning StrategyOur store go forth be positioned in customer mind with its name VIVHA UTSAV Wedding Shop. whatsoever who result hear or see this name, ultimately go distinguish that it is a store for wedding shopping.Sales StrategyOur gross revenue dodge is designed in that way that it pull up s plightsing lead to close the deal. When a customer result enter in our shop, she entrust feel that her place in wedding and needs are very in-chief(postnominal) for us. We pull up stakes make an environment in which shopping for other items impart be as significant as the experience of shopping for wedding attire. At Vivha utsav other wedding parties like mother, sister and friends will also discover equal importance and attention as the bride receives.Market Share ab initio our market share will be low or modest.But it is anticipate to grow at a good rate because of our unique box the Vivha Utsav is targetingSWOT ANALYSISStrength1) It is the only store of its own casing. While most of the boutiques focus on selling only wedding dresses, we give importance to other items also.2) We will provide different attendants to bride, mothers, sisters and friends so that they can buy the most appropriate dress and accessories for themselves.3) Our wide range of uniform style, designer and accessories.Weakness-1) We are planning to cater only the market for brides and her female relatives and friends not the groom wear market. so we may not get the attention of some customer because of this reason.2) Wedding business is a seasonal business. We will have small no of foot move in the off seasonOpportunity1) Increasing trend of acquire designer wedding dresses and accessories.2 ) At our shop along with bridal dress and accessory focus is on other items also. Our customer will be offered a wide selection of their desired attire, and their needs will be our primary focus.Threats1) Competitors who already exist in the market may have prices lower than our products.2) People who already had a wedding in the past may prefer to go to boutique from where they bought in past.Promotional system1) We will start with standard print and online listings in wedding media.We will advertise through local newspaper, matrimonial sites, local weddinh publications2) We will tamp down some wedding shows so that the customer can have a look on what we are going to provide them.3) We will take a shit relationships with marriage consultants, who can refer us to the customer for wedding shopping.4) We will register ourselves in yellow pages under the bridal sector, so this will act as a standard source for customer to surface us.5) We will also have a website so that the custo mer who wants to drive in more about us before shop at our can have all the information which she wants. They can also know about store location and store time. Those who are unable to physically come to place an order can place the order online.4) OPERATIONAL PLANLocationWe will locate our store in downtown Patna because of its routine activities it will draw a large no of foot locomote into the area. It is a destination shopping area .It also the hub of public deportee and there is high level of pedestrian commerce and it also has a good no of residents living in the area. We have selected the corner of a main intersection with free parking.Store layoutOur store will be two story building. First floor will be for carry dresses and accessories for brides mother, her sister and friends. Second floor will be carrying the dresses and accessories for bride. On both the floor there will be changing and dressing room. Store layout will be free from. It will provide an Intimate, Rela xing environment that will facilitate shopping and Browsing. We will place fixtures holding the in vogue(p) styles along the perimeter of the stores layout. Flooring and lighting will clearly strike out the different product areas. The silver counter will be at the exit of the store.Key SupplierWe will make contract with different designer, manufacturer of theoretical accounts different items need to decorate the dresses and other accessories. Other provider will be for sewing machines, embroidery machine, needles, threads etc. reference book PolicyWe will not sell anything on credit. When a dress will being made to order, a fifty percent, non refundable deposit will be required. Once the dress is ready, the customer will have to yield the entire due amount before taking the dress from the store. This insurance is applied on all other items also.Store management Vivha Utsav will conduct business on weekdays from 9 am to 6 pm and on weekends from 10am to 8 pm. We will have work force including store manager, receptionist, cashier and part time sales associates, who all will be females only, because some customers may feel uncomfortable in the presence of male employee. The store will have three sales associate on weekdays and five sales associate on weekends to avoid problem of dealing in store. Moreover before coming to the store to get the dress and accessories customers will have to take appointment. This will also help avoiding the traffic problem. Sales associate will be paid on hourly bases and the store manager and receptionist will be paid monthly. The working hours will be increased at the season time to accommodate the plan increase in sales, so as their salaries will also increase. almost sales goals will be set for all the employees and when the employees will fulfill those goals they will be rewarded monrtarily.To achieve those goals employees will need to do the following things-a) Pay attention to the customer customers need to be acknow ledges right from the time they enter in the store because everyone, who will step in our store, will be preparing for the big event. They need to be taken seriously instantaneously because they will not be in our store for fun or casual purpose.b) Keep customer focused The process of choosing bridal attire and accessories can be a longer one, because it is a very important purchase and there are so many variables like colors, type, fabric etc. so if the sale representative will navigate the customer efficiently through the process it can lead to the desired outcome.c) We will not only sell goods but will also sell shopping experience. Because wedding purchase especially bridal attires are as very emotionally attached and memorable process for bride, her mother and friends. So the employees should try to satisfy them in all possible manners so that the experience becomes a positive one so that they recommend us to their friends and relative for wedding purchase.Merchandising Manage mentThe dresses and other accessories will be sold on made-to order basis. So a sample of each product of each style will be kept in store so that customer can try on. If however a customer is satisfied with the floor design she can purchase that product. We will contact the designer who set minimums that is we require purchasing a certain(prenominal) number of sample products. We will keep track of our entire sales in computers in terms of no of times particular is purchased, which type of product is most demanding etc. If some items are selling poorly, they will be discounted, sold off rack or will be replaced by new items.5) Financial PlanRequirementsWe will need Rs.50 lakh to get our business off the ground. We are currently seeking living from outside investors and business loans. In the starting we will raise Rs.15 lakh in equity capital. We are seeking investors for additional Rs. 25 lakh and Rs 10 lakh in loans.Use of FundsFunds will be used to pay for renovations, constru ction of fitting rooms, sales counter, painting, carpeting, lighting, and dcor and display fixtures. We will also purchase inventory computers, a cash register and inventory management system. The remaining of the Startup funds will be utilized to cover operating expenses, such as rent, utilities, marketing, cost and wages.Profitloss projectionBased on our marketing plans, location, store size and product offerings we expect to collect annual sales of Rs.5040000 in 1st year. Our average cost of goods sold will be 40%, which leaves us with a gross margin of 60%.Our monthly fixed cost is estimated to be Rs 113125, so we will need to generate sales of Rs 4, 20,000 monthly to rag the breakeven point. We will become profitable monthly basis after our initiatory year.Break even analysisParticularsAmount(Rs)Sales5040000Variable cost3252000Contribution(sales-VC)1788000 fixed cost1357500Net profit430500Profit volume Ratio = (Contribution/sales)* coke= (1788000/5040000)*100= 35%BEP point (R s) =Fixed cost/PV ratio= 1357500/35%= Rs.3826510BEP Point (months) =BEP point (Rs)/monthly sales= 3826510/420000= 9.11So we will take 9 months and 4 day to reach the break even salesCash Flow ProjectionsWe will collect immediate payment from customer because we will not give credit to customer, so our cash endure statement will be substantially similar to our income statement. Our cash settle statement will clearly demonstrate our ability to cover all bills.

Friday, March 29, 2019

Why a sense of identity is important

Why a scent out of one-on-oneism is authoritativeThere argon many definitions of resilience b arly most possess similar components. Gilligans (2000) definition advances a set of qualities that helps a person to withstand many of the negative effects of adversity. Bearing in mind what has happened to them, a resilient youngster does better than he or she ought to do is one of the more straightforward. Critically, most authors consider that resilience is a mixture of nature and nurture. Attri howeveres that some children are born with, such as good intellectual ability and a placid, cheerful temperament, are associated with resilience. fryren who are born prematurely and/or with disabilities, who cry and stinkernot be comforted, who gitnot sleep or who will not accept world held are more unprotected to adversity and may be less likely to be resilient.The end sharpen resilience is used to describe why some people postulate hard to cope with life experiences while others survive with self-esteem, identicalness element and their take aim of wellbeing intact. The concept of resilience has been used to refer toa positivist outcome despite the experience of adversitycontinued positive or effective functioning in obstinate circumstances or recuperation after a epochal trauma. (Masten bring upd in Schoon, 2006, p. 7)Johnston-Wilder and Collins quote What constitutes adversity, adverse conditions and trauma varies among case-by-cases and between cultures. Like adults, children vary considerably as to what they arrest faint, hard or impossible to deal with. When children are exposed to a stimulus that might offer a threat to self-image or self-esteem, they reply differently. (Johnston-Wilder and Collins, 2008 pg 54)Very little distresses parent/carers more than witnessing their children struggle to cope with lifes difficulties. Trouble, any(prenominal) its form or seed, holds the potential of engendering negative emotions in children and exhaus ting their head resources. If the trouble is serious or long lasting, it may reduce a childs chances of attaining life enhancing goals and experiencing sustained episodes of maneuvered uply invigorating pleasure. It may also function a child on a course of maladaptive functioning. enkindle/carers typically devote huge energy trying to eliminate the source of difficulty or date.However, the government initiatives such as Every Child Matters Change for Children (DfES, 2004) attempt to address the issue of identity and self-esteem, stressing the richness of supporting all childrens brotherly and emotional break outment. Such support asks to be base on an understanding of identity fundamental law, which involves a consideration of definitions of identity and of the complexity of the destination.John Bowlbys theory of attachment argued that a childs emotional stay to their familial care urinater was a biological response that dated survival. The quality of attachment, he quotes, has implications for the childs capableness to form trusting relationships. To put Bowlbys theory into practice, Pound states the of import positive outcomes of good attachment experiences in the early years take care to be sociable ones Self confidence Efficacy Self-esteem The capacity to care for others and to be cared for. (Pound, 2008, pg 44 and 45)Consequently, the attachment theory suggests that childrens self-esteem is profoundly affected by the quality of early relationships between children and their parents, carers or significant others. Knowledge of attachment and separation conducts can be useful in supporting children who show unusual signs of stress in unfamiliar social situations, such as the transition to school (Barrett and Trevitt, 1991). Critcially both, Johnston-Wilder and Collins quote precisely even exponents of attachment theory recognise that attachment history is still partially useful in predicting some outcomes for children, and even these wo uld not be uniquely predicted by attachment history. Practitioners call for to use a clench of theories and knowledge to understand the behaviour of children with whom they work and be tolerant of individual differences and needs. There can, however, be pressures on such tolerance schools, for example, often absolve their exclusion policies with reference to the need to educate all children and keep them upright from harm. (Johnston-Wilder and Collins, 2008 pg 44)Valerie Daniels quotes Being able to communicate is a real asset when works with children. Body language says a lot. What you say, what, the way you be fall in, even to the other adults in the room tallys a very real impact on children. exactly if at all possible try and be as innate(p) as possible with children. (Open University, 2008)The UNICEF document, An Overview of Child Well-being in Rich Countries provided an overview of the state of childhood in the majority of economically advanced nations of the world. The document states The UK bedded in the cigaret third of the country rankings for louvre of the six dimensions reviewed. spell the country ranked higher in the educational well-being dimension, the UK lags hind end in terms of relative poverty and deprivation, quality of childrens relationships with their parents and peers, child wellness and safety, behaviour and risk-taking and subjective well-being. (UNICEF 2007, pg Report Card 7). Critically, there is still considerable work to be done, to enhance all dimensions of child welfare, despite increase government investments in improving childrens services over the past 10 years.Daniel Coleman quotes critically, parents/carers are asked to attend emotional needs of their children and are prompted to train themselves to wish their interpersonal relations wisely. It is critical, that as a parent/carer, they should know closely origin of their emotions, functioning of their brain and positive usage of their feelings. Critically, the y need to control their emotions while making decisions otherwise they read the capability to hijack their rationality. some(prenominal) may face different situations and make spur of the moment decisions, followed by their emotions. Decisions may not be logical even though they may have sharp logics (Coleman, 1996). Consequently, responsibility for school readiness lies not with the child, just now with the parent/carers who care for them and the educational systems. Parent/Carers therefore, need to attend to the emotional needs of their children and prompted to train themselves to handle their own interpersonal relations wisely. Foley and Leverett, quote There are a number of aspects of emotional literacy that may usefully be grouped, such as recognising your own emotional state, managing your own emotions, recognising others emotions, being able to be explicit about feelings, and being able to tittle-tattle about talking. These skills and understandings are important componen ts with which to build and sustain relationships with others. Here a child describes how, in her school, a simple bully box can encourage children to communicate worries and feelings (Foley and Leverett, 2008 pg 17)This work complements existing national initiatives to promote social and emotional well-being. It should be considered in the context of the Social and Emotional Aspects of larn (SEAL) programme and related community-based initiatives. SEAL supports childrens social, emotional and behavioural skills. It focuses on five social and emotional aspects of learning self-awareness, managing feelings, motivation, empathy and social skills. It looks at helping children burst skills such as understanding anothers point of view, working in a group, sticking at things when they get difficult, resolving conflict and managing worries. These initiatives stress the importance of such programmes to enable children to participate fully in the development to ensure their views are heard. However, a growing body of research indicates how identity make-up is an important indicator of feelings of wellbeing and self-worth (Canino et al., 2004 Rapee et al., 2006). Our individual perception of, and how we value, ourselves is linked to our behaviour and social performance. This process becomes important to all who work with children because identity formation and feelings of wellbeing are strongly linked to life experiences and success (Kernis, 1995). vile self-esteem is associated with anxiety development among young children (Canino et al., 2004 Rapee et al., 2006), identity conflict (Kendall and Kessler, 2002) and, in extreme cases, psychiatric distress and dis straddle (Burns and Rapee, 2006).The United Nations radiation diagram on the Rights of the Child (United Nations, 1989), including the participation rights of the child, and so incorporates a dimension solely based on childrens own spirit of wellbeing. International measurements and comparisons such as these should give an indication of a countrys strengths and weaknesses and of what is achievable childrens wellbeing in rich countries is, in reality, policy-susceptible. It would appear that the UK has rather more weaknesses than strengths the UK, at the time of writing, was in the bottom third of the rankings for five of the six dimensions of childrens wellbeing in the UNICEF report.Critically, practitioners face a dilemma around needing to both accept and change childrens perceptions of themselves in order to promote their wellbeing. Developing resilience is also of vital importance if children are to face up to and cope successfully with the challenges that come their way. Consequently, Susan Rodger states Youth comprehension Project was developed to encourage young people with disabilities to access mainstream clubs and groups. I ring its important they attend clubs like everybody else. They should be allowed to have that sense of belonging in these organisations without having to have their mum perhaps going on with them. (Open University, 2008). Lorraine states If you see her body language, when she walks in, and shes walking up high and her shoulders are bear out and shes walking in and she thinks shes the bees knees. And shes saying bye to her brothers and you know, theyre quite high because they think its great that their sisters doing the same things as any other girls and thats really important for their self-esteem as well. It speaks volumes. I think its a struggle to get a child like Vanessa involved in just public activities, usually because of peoples attitudes, because that attitude can be based on fear, it can be based on ignorance, it can be based on a whole variety of reasons, but it was a struggle. I regard as like most things with a child with disability, to actually get to the point baseline almost, where other parents are, you know, starting off from, is a struggle. So it wasnt easy because not all the Guide groups in Stirling wanted to take her. (Open University, 2008). separate important issues are what working effectively with others means how the relevant skills develop how children can be enabled to make choices about fitting in where things may go wrong and how positive intervention strategies can be applied. Nicola tike quotes Children need to development their sense of responsibility not just to others but themselves. If I am talking to a group of children we all have to respect thata particularchild has the right to be listened in addition and views taken seriously, then that child must realise that applies to the other children too and it then becomes his responsibility to listen.. and so on. (Open University, 2010).Critically, Identity is a complex term and process and consequently influenced by a myriad of social factors, an identity develops and evolves as a life story. Identity formation begins prior to return and is influenced by social context, interpersonal relationships and the social constru ction of meaning. An understanding of the complexity and fluidity of identity development can help us to query ascribed labels, which may create barriers for children and between children. This provides practitioners working with children with a methodological performer that urges them to examine the importance of the whole child and the whole child in context.Childrens wellbeing is connected to finding out about themselves and who they want to be. In the light of a childs right to preserve his or her identity (United Nations Convention on the Rights of the Child, United Nations, 1989), practitioners have a responsibility to ensure that the children with whom they work can develop an identity in an atmosphere that challenges discrimination and prejudice. Consequently, adults need to know the children with whom they work, to work to build positive relationships with them and between children themselves, understanding and respecting their individual and emerging frames of reference. As professionals who work with families, our willingness to talk openly about identity and to help foster a positive sense of self in children can make an enormous difference in affirming the rich regeneration of our human community and helping children make bridges across cultures and traditions.Children need to be treated as individuals one size fits all responses are not helpful. Remember that communication of your interest and concern in the child is essential it is often the little things where, for instance, you have gone the extra stat mi beyond the call of duty, where you have bought something the child particularly treasures or you have just been there to listen and comfort, that matter and are remembered. Residential workers who have a determined resilience perspective will often make a positive and long lasting difference to looked after childrens lives.

Literature review about data warehouse

Literature inspection about selective education storeCHAPTER 2LITERATURE REVIEW2.1 INTRODUCTIONChapter 2 yields literature review about entropy storage storage w atomic number 18house, OLAP MDDB and discipline mine apprehension. We reviewed concept, characteristics, human body and execution asc finis of each above menti sensory facultyd technology to identify a suitable info store frame constitute. This framework will hold water integration of OLAP MDDB and info mining mock up. voice 2.2 discussed about the fundamental of entropy storage store which ac experiences selective randomness storage store elbow roomls and entropy passageing techniques much(prenominal) as extract, transform and loading (ETL) extremityes. A comparative study was dvirtuoso on info storage storage storage w behouse influences introduced by William Inmons (Inmon, 1999), Ralph Kimb all(prenominal) (Kimball, 1996) and Matthias Nicola (Nicola, 2000) to identify suitable form, plan and characteristics. Section 2.3 introduces about OLAP model and computer architecture. We in addition discussed concept of puzzle outing in OLAP ground MDDB, MDDB dodge gravel and implementation. Section 2.4 introduces entropy mining techniques, systems and processes for OLAP mining (OLAM) which is used to mine MDDB. Section 2.5 houses de lineination on literature review especially pointers on our finis to hint a new entropy warehouse model. Since we propose to use Microsoft oerlap to implement the propose model, we similarly discussed a product comparison to loose why Microsoft product is selected. 2.2 selective randomness WAREHOUSE accord to William Inmon, info warehouse is a subject- point, unified, time-variant, and non-volatile collection of info in support of the focuss decision-making process (Inmon, 1999). entropy warehouse is a selective informationbase blocking entropy that unremarkably represents the mintiness history of an compositi on. This historic entropy is used for summary that supports business decisions at m any an(prenominal) levels, from strategic planning to performance evaluation of a discrete organizational unit.It provides an strong integration of useable entropybases into an surround that enables strategic use of information (Zhou, Hull, world power and Franchitti, 1995). These technologies include relative and MDDB management outlines, lymph node/ emcee architecture, meta-selective information modelling and repositories, graphic user interface and much much (Hammer, Garcia-Molina, Labio, Widom, and Z gigantic, 1995 Harinarayan, Rajaraman, and Ullman, 1996). The emergence of cross written report domain such as association management in finance, health and e-commerce remove go upd that vast amount of selective information need to be conk outd. The evolution of selective information in selective information warehouse evoke provide multiple selective informationset dimensions to solve diverse problems. Thus, critical decision making process of this dataset needs suitable data warehouse model (Barquin and Edelstein, 1996).The main proponents of data warehouse are William Inmon (Inmon, 1999) and Ralph Kimball (Kimball, 1996). But they excite divergent perspectives on data warehouse in term of design and architecture. Inmon (Inmon, 1999) defined data warehouse as a dependent data market place expression era Kimball (Kimball, 1996) defined data warehouse as a bus establish data mart structure. Table 2.1 discussed the differences in data warehouse structure mingled with William Inmon and Ralph Kimball.A data warehouse is a read- lone(prenominal) data witnesser where end-users are not allowed to change the assesss or data elements. Inmons (Inmon, 1999) data warehouse architecture strategy is different from Kimballs (Kimball, 1996). Inmons data warehouse model splits data marts as a copy and distri aloneed as an interface between data warehouse and end users. Kimballs views data warehouse as a unions of data marts. The data warehouse is the collections of data marts combine into one commutation repository. Figure 2.1 illustrates the differences between Inmons and Kimballs data warehouse architecture adopted from (Mailvaganam, 2007).Although Inmon and Kimball surrender a different design view of data warehouse, they do keep on masteryful implementation of data warehouse that depends on an efficacious collection of operational data and validation of data mart. The role of database represent and ETL processes on data are inevitable components in both researchers data warehouse design. Both believed that dependant data warehouse architecture is required to fulfil the requirement of green light end users in term of preciseness, measure and data relevancy2.2.1 DATA WAREHOUSE ARCHITECTUREAlthough data warehouse architecture clear considerable research scope, and it endure be viewed in many perspectives. (Thilini and Hugh, 2005 ) and (Eckerson, 2003) provide approximately meaningful way to view and analyse data warehouse architecture. Eckerson states that a successful data warehouse system depends on database theatrical production process which derives data from different integrated Online Transactional touch (OLTP) system. In this case, ETL process plays a crucial role to make database scaffolding process workable. Survey on factors that influenced selection on data warehouse architecture by (Thilini, 2005) indentifies five data warehouse architecture that are common in use as shown in Table 2.2mugwump selective information MartsIndependent data marts also known as locate or small scale data warehouse. It is mainly used by departments, divisions of company to provide individual operational databases. This typeface of data mart is simple yet populates of different form that was derived from multiple design structures from various inconsistent database designs. Thus, it complicates cross data mart ana lysis. Since every organizational units melt to build their own database which operates as independent data mart (Thilini and Hugh, 2005) cited the work of (Winsberg, 1996) and (Hoss, 2002), it is best used as an ad-hoc data warehouse and also to be use as a prototype forward building a real data warehouse.Data Mart Bus Architecture(Kimball, 1996) pioneered the design and architecture of data warehouse with unions of data marts which are known as the bus architecture or virtual data warehouse. Bus architecture allows data marts not only located in one host merely it can be also being located on different server. This allows the data warehouse to endures more(prenominal) in virtual mode and combined all data marts and process as one data warehouse.Hub-and-spoke architecture(Inmon, 1999) developed hub and spoke architecture. The hub is the central server fetching care of information exchange and the spoke do by data variety for all regional operation data stores. Hub and spok e mainly rivet on building a scalable and maintainable infrastructure for data warehouse.Centralized Data Warehouse ArchitectureCentral data warehouse architecture build establish on hub-and-spoke architecture but without the dependent data mart component. This architecture copies and stores heterogeneous operational and impertinent data to a bingle and consistent data warehouse. This architecture has only one data model which are consistent and complete from all data character references. According to (Inmon, 1999) and (Kimball, 1996), central data warehouse should consist of database staging or known as operational data store as an intermediate stage for operational processing of data integration before transform into the data warehouse.Federated ArchitectureAccording to (Hackney, 2000), federated data warehouse is an integration of multiple heterogeneous data marts, database staging or operational data store, combination of analytical application and reporting systems. The co ncept of federated focus on integrated framework to make data warehouse more reliable. (Jindal, 2004) conclude that federated data warehouse are a practical approach as it focus on higher(prenominal)(prenominal) reliability and provide excellent value.(Thilini and Hugh, 2005) conclude that hub and spoke and centralized data warehouse architectures are similar. Hub and spoke is faster and easier to implement because no data mart are required. For centralized data warehouse architecture scored higher than hub and spoke as for urgency needs for relatively fast implementation approach.In this work, it is very of the essence(predicate) to identify which data warehouse architecture that is robust and scalable in terms of building and deploying enterprise wide systems. (Laney, 2000), states that selection of appropriate data warehouse architecture must curb successful characteristic of various data warehouse model. It is evident that 2 data warehouse architecture prove to be favourite as shown by (Thilini and Hugh, 2005), (Eckerson, 2003) and (Mailvaganam, 2007). First hub-and-spoke proposed by (Inmon, 1999) as it is a data warehouse with dependant data marts and secondly is the data mart bus architecture with dimensional data marts proposed by (Kimball, 1996). The selection of the new proposed model will use hub-and-spoke data warehouse architecture which can be used for MDDB modelling.2.2.2 DATA WAREHOUSE EXTRACT, TRANSFORM, LOADINGData warehouse architecture process begins with ETL process to interpret the data passes the quality threshold. According to Evin (2001), it is essential to wipe out right dataset. ETL are an important component in data warehouse environment to envision dataset in the data warehouse are cleansed from various OLTP systems. ETLs are also responsible for tiltning schedule tasks that extract data from OLTP systems. Typically, a data warehouse is populated with historical information from within a particular organization (Bunger, Col by, Cole, McKenna, Mulagund, and Wilhite, 2001). The complete process descriptions of ETL are discussed in table 2.3.Data warehouse database can be populated with a wide variety of data sources from different local anaestheticisation principles, olibanum collecting all the different dataset and storing it in one central fixture is an extremely challenging task (Calvanese, Giacomo, Lenzerini, Nardi, and Rosati, , 2001). However, ETL processes eliminate the difficultity of data nation via simplified process as depicts in figure 2.2. The ETL process begins with data extract from operational databases where data cleansing and scrubbing are done, to ensure all datas are clear. Then it is transform to meet the data warehouse standards before it is loaded into data warehouse.(Zhou et al, 1995) states that during data integration process in data warehouse, ETL can assist in import and export of operational data between heterogeneous data sources using Object linking and embedding dat abase (OLE-DB) based architecture where the data are transform to populate all validated data into data warehouse.In (Kimball, 1996) data warehouse architecture as show in figure 2.3 focuses on three important modules, which is the binding room presentation server and the front room. ETL processes is implemented in the grit room process, where the data staging work in charge of concourse all source systems operational databases to perform stock of data from source systems from different file format from different systems and platforms. The second step is to run the transformation process to ensure all inconsistency is removed to ensure data integrity. Finally, it is loaded into data marts. The ETL processes are commonly executed from a job control via scheduling task. The presentation server is the data warehouse where data marts are stored and process here. Data stored in star outline consist of dimension and fact tables. This is where data are then(prenominal) process of i n the front room where it is access by wonder services such as reporting tools, desk upside tools, OLAP and data mining tools.Although ETL processes prove to be an essential component to ensure data integrity in data warehouse, the issue of complexity and scalability plays important role in decision making types of data warehouse architecture. One way to achieve a scalable, non-complex upshot is to adopt a hub-and-spoke architecture for the ETL process. According to Evin (2001), ETL best operates in hub-and-spoke architecture because of its flexibility and efficiency. Centralized data warehouse design can influence the care of full access control of ETL processes.ETL processes in hub and spoke data warehouse architecture is recommended in (Inmon, 1999) and (Kimball, 1996). The hub is the data warehouse after processing data from operational database to staging database and the spoke(s) are the data marts for distributing data. Sherman, R (2005) state that hub-and-spoke approac h uses one-to-many interfaces from data warehouse to many data marts. One-to-many are simpler to implement, cost effective in a bulky run and ensure consistent dimensions. Compared to many-to-many approach it is more compound and costly.2.2.3 DATA WAREHOUSE FAILURE AND SUCCESS FACTORSBuilding a data warehouse is indeed a challenging task as data warehouse run across inheriting a unique characteristics that may influence the overall reliability and robustness of data warehouse. These factors can be applied during the analysis, design and implementation phases which will ensure a successful data warehouse system. Section 2.2.3.1 focus on factors that influence data warehouse check failure. Section 2.2.3.2 discusses on the success factors which implementing the correct model to support a successful data warehouse project.2.2.3.1 DATA WAREHOUSE FAILURE FACTORS(Hayen, Rutashobya, and Vetter, 2007) studies shows that implementing a data warehouse project is costly and risky as a da ta warehouse project can cost over $1 million in the first year. It is estimated that two-thirds of the effort of setting up the data warehouse projects attempt will fail eventually. (Hayen et al, 2007) cited on the work of (Briggs, 2002) and (Vassiliadis, 2004) observe three factors for the failure of data warehouse project which is environment, project and practiced factors as shown in table 2.4.Environment leads to organization changes in term of business, politics, mergers, takeovers and lack of top management support. These include human wrongdoing, corporate culture, decision making process and worthless change management (Watson, 2004) (Hayen et al, 2007). Poor technological knowledge on the requirements of data definitions and data quality from different organization units may cause data warehouse failure. Incompetent and insufficient knowledge on data integration, poor selection on data warehouse model and data warehouse analysis applications may cause huge failure.In spite of heavy investment on hardware, software and people, poor project management factors may lead data warehouse project failure. For example, assigning a project manager that lacks of knowledge and project set about in data warehouse, may cause impediment of quantifying the return on investment (ROI) and achievement of project triple constraint (cost, scope, time).Data self-control and accessibility is a potential factor that may cause data warehouse project failure. This is considered vulnerable issue within the organization that one must not share or acquire someone else data as this considered losing authority on the data (Vassiliadis, 2004). Thus, it emphasis restriction on any departments to declare total ownership of pure clean and error free data that might cause potential problem on ownership of data rights.2.2.3.2 DATA WAREHOUSE SUCCESS FACTORS(Hwang M.I., 2007) stress that data warehouse implementations are an important area of research and industrial practices but o nly few researches made an assessment in the critical success factors for data warehouse implementations. He conducted a survey on sextette data warehouse researchers (Watson Haley, 1997 Chen et al., 2000 Wixom Watson, 2001 Watson et al., 2001 Hwang Cappel, 2002 Shin, 2003) on the success factors in a data warehouse project. He concluded his survey with a arguing of successful factors which influenced data warehouse implementation as depicted in figure 2.8. He shows eight implementation factors which will directly fix the six selected success variablesThe above mentioned data warehouse success factors provide an important guideline for implementing a successful data warehouse projects. (Hwang M.I., 2007) studies shows an integrated selection of various factors such as end user participation, top management support, acquisition of quality source data with profound and clear business needs plays crucial role in data warehouse implementation. Beside that, other factors that was h ighlighted by Hayen R.L. (2007) cited on the work of Briggs (2002) and Vassiliadis (2004), Watson (2004) such as project, environment and technical knowledge also influenced data warehouse implementation.SummaryIn this work on the new proposed model, hub-and-spoke architecture is use as Central repository service, as many scholars including Inmon, Kimball, Evin, Sherman and Nicola adopt to this data warehouse architecture. This approach allows locating the hub (data warehouse) and spokes (data marts) centrally and can be distributed across local or wide area network depending on business requirement. In designing the new proposed model, the hub-and-spoke architecture clearly identifies six important data warehouse components that a data warehouse should have, which includes ETL, Staging Database or operational database store, Data marts, MDDB, OLAP and data mining end users applications such as Data interrogative, reporting, analysis, statistical tools. However, this process may di ffer from organization to organization. Depending on the ETL setup, some data warehouse may overwrite old data with new data and in some data warehouse may only maintain history and audit trial of all changes of the data.2.3 ONLINE uninflected PROCESSINGOLAP Council (1997) define OLAP as a group of decision support system that facilitate fast, consistent and interactive access of information that has been reformulate, transformed and summarized from relational dataset mainly from data warehouse into MDDB which allow optimal data retrieval and for performing trend analysis.According to Chaudhuri (1997), Burdick, D. et al. (2006) and Vassiladis, P. (1999), OLAP is important concept for strategic database analysis. OLAP have the ability to analyze large amount of data for the extraction of valuable information. Analytical development can be of business, education or medical sectors. The technologies of data warehouse, OLAP, and analyzing tools support that ability. OLAP enable discove ring pattern and relationship contain in business action by query tons of data from multiple database source systems at one time (Nigel. P., 2008). Processing database information using OLAP required an OLAP server to organize and transformed and builds MDDB. MDDB are then correctd by stoppages for client OLAP tools to perform data analysis which aim to discover new pattern relationship between the pulley-blocks. Some popular OLAP server software programs include Oracle (C), IBM (C) and Microsoft (C).Madeira (2003) supports the fact that OLAP and data warehouse are complementary technology which blends together. Data warehouse stores and manages data eon OLAP transforms data warehouse datasets into strategic information. OLAP function honks from basic navigation and browse (often known as slice and dice), to calculations and also serious analysis such as time series and complex modelling. As decision-makers implement more advanced OLAP capabilities, they move from basic data a ccess to universe of information and to discovering of new knowledge.2.3.4 OLAP ARCHITECTUREIn comparison to data warehouse which usually based on relational technology, OLAP uses a third-dimensional view to come data to provide rapid access to strategic information for analysis. there are three type of OLAP architecture based on the method in which they store multi-dimensional data and perform analysis operations on that dataset (Nigel, P., 2008). The categories are flat OLAP (MOLAP), relational OLAP (ROLAP) and hybrid OLAP (HOLAP). In MOLAP as depicted in plat 2.11, datasets are stored and summarized in a multidimensional cube. The MOLAP architecture can perform faster than ROLAP and HOLAP (C). MOLAP cubes designed and build for rapid data retrieval to enhance efficient cut and dicing operations. MOLAP can perform complex calculations which have been pre-generated after cube creation. MOLAP processing is restricted to initial cube that was created and are not bound to any ad ditional replication of cube.In ROLAP as depict in Diagram 2.12, data and aggregations are stored in relational database tables to provide the OLAP slicing and dicing functionalities. ROLAP are the slowest among the OLAP flavours. ROLAP relies on data manipulating directly in the relational database to give the manifestation of conventional OLAPs slicing and dicing functionality. Basically, each slicing and dicing action is equivalent to adding a WHERE clause in the SQL statement. (C)ROLAP can manage large amounts of data and ROLAP do not have any limitations for data size. ROLAP can influence the intrinsic functionality in a relational database. ROLAP are slow in performance because each ROLAP activity are essentially a SQL query or multiple SQL queries in the relational database. The query time and number of SQL statements executed measures by its complexity of the SQL statements and can be a bottleneck if the underlying dataset size is large. ROLAP essentially depends on SQL sta tements generation to query the relational database and do not add all needs which make ROLAP technology conventionally limited by what SQL functionality can offer. (C)HOLAP as depict in Diagram 2.13, combine the technologies of MOLAP and ROLAP. Data are stored in ROLAP relational database tables and the aggregations are stored in MOLAP cube. HOLAP can drill down from multidimensional cube into the underlying relational database data. To acquire thick type of information, HOLAP leverages cube technology for faster performance. Whereas to believe detail type of information, HOLAP can drill down from the cube into the underlying relational data. (C)In OLAP architectures (MOLAP, ROLAP and HOLAP), the datasets are stored in a multidimensional format as it involves the creation of multidimensional blocks called data cubes (Harinarayan, 1996). The cube in OLAP architecture may have three axes (dimensions), or more. apiece axis (dimension) represents a logical grade of data. One axis may for example represent the geographic location of the data, while others may indicate a state of time or a specific school. each(prenominal) of the categories, which will be described in the following section, can be broken down into successive levels and it is assertable to drill up or down between the levels.Cabibo (1997) states that OLAP partitions are commonly stored in an OLAP server, with the relational database frequently stored on a separate server from OLAP server. OLAP server must query across the network whenever it needs to access the relational tables to resolve a query. The impact of querying across the network depends on the performance characteristics of the network itself. Even when the relational database is placed on the aforesaid(prenominal) server as OLAP server, inter-process calls and the associated context switching are required to retrieve relational data. With a OLAP partition, calls to the relational database, whether local or over the network, do not occur during querying.2.3.3 OLAP FUNCTIONALITYOLAP functionality offers dynamic multidimensional analysis supporting end users with analytical activities includes calculations and modelling applied across dimensions, trend analysis over time periods, slicing subsets for on-screen viewing, cut to deeper levels of records (OLAP Council, 1997) OLAP is implemented in a multi-user client/server environment and provide reliably fast response to queries, in spite of database size and complexity. OLAP facilitate the end user integrate enterprise information through relative, customized viewing, analysis of historical and present data in various what-if data model scenario. This is achieved through use of an OLAP Server as depicted in diagram 2.9.OLAP functionality is provided by an OLAP server. OLAP server design and data structure are optimized for fast information retrieval in any course and flexible calculation and transformation of unprocessed data. The OLAP server may either actua lly carry out the processed multidimensional information to distribute consistent and fast response times to end users, or it may fill its data structures in real time from relational databases, or offer a choice of both.Essentially, OLAP create information in cube form which allows more composite analysis compares to relational database. OLAP analysis techniques employ slice and dice and drill methods to segregate data into lade of information depending on given parameters. Slice is identifying a single value for one or more variable which is non-subset of multidimensional array. Whereas dice function is application of slice function on more than two dimensions of multidimensional cubes. Drilling function allows end user to traverse between condensed data to most precise data unit as depict in Diagram 2.10.2.3.5 MULTIDIMENSIONAL DATABASE SCHEMAThe base of every data warehouse system is a relational database build using a dimensional model. Dimensional model consists of fact and d imension tables which are described as star dodge or snowflake strategy (Kimball, 1999). A schema is a collection of database objects, tables, views and indexes (Inmon, 1996). To understand dimensional data modelling, Table 2.10 defines some of the terms commonly used in this type of modellingIn designing data models for data warehouse, the most commonly used schema types are star schema and snowflake schema. In the star schema design, fact table sits in the middle and is connected to other environ dimension tables like a star. A star schema can be simple or complex. A simple star consists of one fact table a complex star can have more than one fact table.Most data warehouses use a star schema to represent the multidimensional data model. The database consists of a single fact table and a single table for each dimension. Each tuple in the fact table consists of a pointer or extraneous key to each of the dimensions that provide its multidimensional coordinates, and stores the numer ic measures for those coordinates. A tuple consist of a unit of data extracted from cube in a range of member from one or more dimension tables. (C, http//msdn.microsoft.com/en-us/library/aa216769%28SQL.80%29.aspx). Each dimension table consists of columns that correspond to attributes of the dimension. Diagram 2.14 shows an example of a star schema For Medical Informatics System.Star schemas do not explicitly provide support for attribute hierarchies which are not suitable for architecture such as MOLAP which require lots of hierarchies of dimension tables for efficient drilling of datasets. Snowflake schemas provide a refinement of star schemas where the dimensional hierarchy is explicitly represented by normalizing the dimension tables, as shown in Diagram 2.15. The main advantage of the snowflake schema is the improvement in query performance due to minimized disk storage requirements and joining littler lookup tables. The main disadvantage of the snowflake schema is the additi onal maintenance efforts needed due to the increase number of lookup tables. (C)Levene. M (2003) stresses that in addition to the fact and dimension tables, data warehouses store selected summary tables containing pre-aggregated data. In the simplest cases, the pre-aggregated data corresponds to aggregating the fact table on one or more selected dimensions. Such pre-aggregated summary data can be represented in the database in at least two ways. Whether to use star or a snowflake mainly depends on business needs. 2.3.2 OLAP EvaluationAs OLAP technology taking prominent place in data warehouse industry, there should be a suitable assessment tool to measure out it. E.F. Codd not only invented OLAP but also provided a set of procedures which are known as the Twelve Rules for OLAP product ability assessment which include data manipulation, unlimited dimensions and aggregation levels and flexible reporting as shown in Table 2.8 (Codd, 1993)Codd twelve rules of OLAP provide us an essenti al tool to swear the OLAP functions and OLAP models used are able to produce desired result. Berson, A. (2001) stressed that a good OLAP system should also support a complete database management tools as a utility for integrated centralized tool to take into account database management to perform distribution of databases within the enterprise. OLAP ability to perform drilling mechanism within the MDDB allows the functionality of drill down right to the source or root of the detail record level. This implies that OLAP tool permit a down changeover from the MDDB to the detail record level of the source relational database. OLAP systems also must support incremental database refreshes. This is an important feature as to retard stability issues on operations and usability problems when the size of the database increases.2.3.1 OLTP and OLAPThe design of OLAP for multidimensional cube is entirely different compare to OLTP for database. OLTP is implemented into relational database to support chance(a) processing in an organization. OLTP system main function is to capture data into computers. OLTP allow effective data manipulation and storage of data for effortless operational resulting in huge quantity of transactional data. Organisations build multiple OLTP systems to handle huge quantities of daily operations transactional data can in shortly period of time.OLAP is designed for data access and analysis to support managerial user strategic decision making process. OLAP technology focuses on aggregating datasets into multidimensional view without hindering the system performance. According to Han, J. (2001), states OLTP systems as Customer oriented and OLAP is a market oriented. He summarized major differences between OLTP and OLAP system based on 17 key criteria as shown in table 2.7.It is complicated to merge OLAP and OLTP into one centralized database system. The dimensional data design model used in OLAP is much more effective for querying than the relati onal database query used in OLTP system. OLAP may use one central database as data source and OLTP used different data source from different database sites. The dimensional design of OLAP is not suitable for OLTP system, mainly due to pleonasm and the loss of referential integrity of the data. Organization chooses to have two separate information systems, one OLTP and one OLAP system (Poe, V., 1997).We can conclude that the declare oneself of OLTP systems is to get data into computers, whereas the purpose of OLAP is to get data or information out of computers. 2.4 DATA MININGMany data mining scholars (Fayyad, 1998 Freitas, 2002 Han, J. et. al., 1996 Frawley, 1992) have defined data mining as discovering hidden patterns from historical datasets by using pattern recognition as it involves searching for specific, unknown information in a database. Chung, H. (1999) and Fayyad et al (1996) referred data mining as a step of knowledge discovery in database and it is the process of analyz ing data and extracts knowledge from a large database also known as data warehouse (Han, J., 2000) and making it into useful information.Freitas (2002) and Fayyad (1996) have recognized the advantageous tool of data mining for extracting knowledge from a da

Thursday, March 28, 2019

Death Comes for the Archbishop: Not a Novel :: Death Comes for the Archbishop

Death Comes for the Archbishop zero(prenominal) a NovelIf someone felt compelled to classify Death Comes for the Archbishop as a type of novel, the most likely candidate would be a regional novel. Clearly, the setting and local color of this work make the region a critical component. However, before classifying the work as a type of novel, it mustiness be determined whether it is a novel or, as Miss Cather has asserted, a memoir. Based on the structure and content of the defend, it does not meet the determinate definitions of novel and plot, so would lend itself more than accurately to Miss Cathers classification.The alter definition of novel given in A Handbook to writings is an extended fictional PROSE muniment (335). By this definition, Cathers book would qualify as a novel. But there is a great deal more to a novel than this definition implies. The handbook expands by stating some organizing principle-PLOT, THEME, or idea-should be present in a . . . a novel (335). Cathe rs book has an idea - to illustrate the historical, regional and cultural context in which deuce European priests per reach missionary work in the desert of the American Southwest in the last half of the nineteenth century. This idea does not constitute a plot. Aristotle maintained that a plot should create a whole with the structural union of the parts being such that, if either one of them is displaced or removed, the whole will be disjoint and gruesome (Holman/Harmon 377). The structure of Death Comes for the Archbishop is made up of a series of episodes consisting of the experiences of devil missionary priests, and legends of the region, such as Our Lady of Guadalupe. Would the whole expire disjointed or disturbed if some of the stories or legends were removed or rearranged? No. The work would lose some of its richness, but the whole would not become incomprehensible. I believe Willa Cather perceived this work as a narrative rather than a novel because it lacked what is tra ditionally considered a plot. The works narrative form is reminiscent of a journal, and had it been written in the first person alternatively of third, it probably would have been classified as a journal narrative rather than a novel.

the order of things (chocolate war) Essay -- essays research papers

The Order of ThingsDisturbing the man is one of the main themes of Robert Cormiers novel, The Chocolate War. Jerry Renault, the protagonist of the novel, goes against Trinity, the all boys crop, and The Vigils, a powerful school gang. He desexualises admired and then bullied because of his defiance of authority. In the beginning of the story, we are introduced to Jerry Renault. As he is trying out for the schools football team, Archie and Obie, two members of The Vigils, are writing assignments for the chosen boys at school. If the boy fails to complete or do his assignment he gets penalise by The Vigils. Archie sees Jerry get slaughtered by the football team and still bed to get up. Archie then decides to give Jerry one of his assignments. The assignment must gibe the kid. Thats the beauty of it, Obie... Put him down for the chocolates (Cormier 15-16). Every year at Jerrys school, Trinity, they have a chocolate barter. And all year, all the students participate. Jerrys assi gnment was to refuse to sell the chocolates for ten school days. Let me get this straight, Renault, Brother Leon said and his voice brought the room under his command. I called your name. Your resolution could have been either yes or no. Yes means that like every other student in this school you agree to sell the chocolates, in this case fifty boxes. No and let me point out that the sale is strictl...