Thursday, October 31, 2019

Direct Marketing in International Markets Assignment

Direct Marketing in International Markets - Assignment Example Direct marketing has various advantages over other marketing methods, but it also suffers from criticisms at times due to its unwanted and fake activities with the customers. Table of Contents Executive Summary 2 Table of Contents 3 1.0 Introduction 4 2.0 Discussion 5 2.1 Use of Direct Marketing in International Markets 5 2.2 Characteristic of Direct Marketing 6 2.3 Difference from Mass-Marketing Approach 7 2.4 Assessment of the Primary Concern That Consumers May Have About the Use of Direct Marketing 9 2.5 The Methods Which Can Be Employed By the Direct Marketing Industry to Counter These Criticisms 10 3.0 Conclusion 11 4.0 Recommendation 12 References 13 1.0 Introduction Direct marketing has emerged as one of the most significant marketing tools in the hands of the marketers over the last few decades. Direct marketing is the selling of goods or services directly to the prospective customers without using any intermediaries, but by using databases of customers and through one or mor e media. With the increasing globalization of world trade ‘international direct marketing’ has enhanced its performance and relevance. Several companies in the direct marketing ground are gradually looking to enter the foreign market for expansion of the business. Efficient international transportation system and improvement in international payment system have eventually encouraged the direct marketers to expand their businesses beyond their national boundaries (Kraft & Et. Al., 2007). According to ‘Advertising Age 2006’, marketers have used over $52.2 million in 2005 on direct marketing. Direct marketing such as traditional direct mail as well as telemarketing has been considered as an efficient method for advertisers and marketers. After the introduction of the Internet, the whole marketing communication strategies of direct marketing have changed drastically (Morimoto & Chang, 2006). In this paper, the use of direct marketing in an international market and its value and importance have been described. Its distinction from the mass marketing has been mentioned in the paper. In addition, the direct marketing acts as a valuable tool for marketing communication. This has been discussed in the paper. Though direct marketing is beneficial for consumers and marketers, it faces criticism from the consumers’ perspective, which has been discussed clearly as well. 2.0 Discussion 2.1 Use of Direct Marketing in International Markets Direct Marketing is considered as one of the fastest growing areas in present-day marketing practice. Direct marketing utilizes various multiple channels such as the Internet, leaflet drop, telephone, direct mail, E-mail and mass media so as to reach particularly to the target foreign customers in an international market in order to obtain an effective response immediately for ultimate sale (George State University, n.d.). Direct marketing in the USA developed into boom industry during the 1980s. Due to dire ct mail, sales growth had risen from $15 billion to $46 billion. The direct marketer had also risen to 13,000. Direct marketing broadened the demand of various companies such as blue-chip industrial in addition to consumer companies which include American Express, IBM, Westinghouse, Sony, 3M, GEICO, Time Inc., along with retail sectors such as Neiman-Marcus, J.C. Penney, and Marshall Field.  

Tuesday, October 29, 2019

Network Design for the 2012 London Olympics Essay Example for Free

Network Design for the 2012 London Olympics Essay This report is a step by step analysis of the requirements planning and implementation of a network based on the infrastructure of an office environment. Throughout this report, the reader will see how the requirements planning is broken down into detailed sections to illustrate how each requirement has been identified for the stages of planning to implementation. In the first part of the report, we will be identifying what hardware is required for the scale of the network, taking into consideration a room for future expansion and devices to be added at a later date. The second part of the report will be the identification of software that will be needed to run all services on the network including set-up and configuration of the software. Network Planning Why is a network required? Before actually planning the set-up of a network, the use of a network has to be justified. There are many uses to a network, some of the basic uses are †¢ Sensitive information exchange – information is shared only between departments and/or specific users and not to other people, e. g. customer account information that contains bank information and/or other personal information. †¢ Internal digital mail requests and communication between departments in a business may be increased and messages can be saved for later use. †¢ Resource sharing – information updated constantly is shared from one location and is referenced by other departments and/or users within the same network, e. g. a database of customer details and orders for a company. †¢ File Backup Services – information is backed up or stored in a secure location in the event of future problems and to maintain records of information. There are other uses of networks as well but mainly they are used as a means of security. Within a company, when a network is utilised correctly, the flow of information across a network can be monitored and tracked back to the user. This is essential to ensure no information used within the company is accessed from an outside source or is used in an unlawful manner by a company employee. Scope of the network Since the network is being made for the London 2012 Olympics, we can assume that the network will be of large scale (roughly 500-2,000 users). This means that each service, such as email and DHCP services, will require its own dedicated hardware in order for the resources to be adequately shared without any network latency or slow access experience. If the network is used on a much smaller scale, then the services could run from using only a few pieces of dedicated hardware such as the domain and email services sharing hardware. A site survey should always be performed before installation a network to ensure that wireless signals can be transmitted throughout the building or buildings and to see how the network can be modelled based on the environment it is going to be installed in. Identifying Network Hardware In this section, we will identify different hardware and its uses on a network, how a network is connected and what devices are used to connect a network throughout a company building. Servers and Services There are many different types of services that can be hosted from a server on a network. Many of these services usually have their own dedicated hardware but depending on the scale of the network, the services can easily be bunched together on the same hardware to cut down on overall equipment usage. Domain Server The domain server is used to authenticate users and computers included on the network. It is considered the main access control to a network because it stores all user account information used in authentication. Email Server The email server is used to direct messages to the correct recipient once the message has been processed by the server. Many companies today use a private internal mail system as a way of faster communication within departments. File Server A file server is used to provide users access to information and data across the network. This helps reduce file duplication across different computers on the network. Permissions can be set for file access so that important documentation can be read but not written to or deleted. DNS Server A DNS server is a kind of server that translates DNS names into an I. P address that is used for communication on the internet. DHCP Server A DHCP server is used by hosts to retrieve I. P addresses and other information. Firewall Server A firewall server is used for monitoring the network for vulnerabilities and intrusions and detecting viruses in the event of an attack from the internet. Application Server An application server is used to host applications and make them a part of the network’s resources. The servers are commonly used to save on costs for multiple software licenses compared to a site license. Database Server A database server is used to host a database for access by users. These servers can be updated and viewed. These are commonly used in finance departments or companies that host customer records that needs to be accessed and amended constantly. Network Devices This section will better explain the other devices that make up a network such as the network equipment itself and other devices which can be considered essential to a networked environment. Modem A modem is used to connect an outside line (usually from an internet service provider) via telephone communication to the network enabling internet access or access to another site’s resources. Router A router is a device that forwards data packets between devices on a network and can manage which network node receives certain data rather than sending the same data to each node. Routers can also have their own firewalls. Switch A switch is used to connect segments of a network together. Switches are an important part of a network as they are used to connect multiple devices at once. These switches come in all shapes and sizes, ranging from a simple 2 port switch to a 48 port switch which fits into a server rack. Wireless Access Point The wireless access point is a device that adds wireless connectivity to your network. This type of network device is often used to connect portable devices such as laptops, PDA and Smartphones to the network. It is also used for wireless printers and installing hardware devices to computers where network cabling is not applicable. Network Printer Network printers are printers made available on the network as a resource so that many users can print from one location. This cuts down multiple hardware usage per computer which saves hardware costs and maintenance. Aside from users, all of these services and devices are what make up a network. Connecting your Network: Cabling and Access Points Now that we have outlined what services and devices make up a network, there is the matter of how a network will be connected. There are a few methods of connecting a network, each with its own pro’s and con’s. The standard method of connecting a network is via cable. Cable Connection Cable connection for a network is one of the most trusted methods of connecting users to resources. The reason for this being that wired connections were the first standard and constant communication to be used with computers. Wireless connection is still a fairly new method of communication and is therefore still changing. Types of Network Cables There are quite a few types of network cables that are used today in business, each suited for different purposes. Twisted Pair is a type of copper cabling that is used for telecommunications and most Ethernet networks. There are two types of twisted pair cabling. †¢ Unshielded twisted pair (UTP) – UTP cables have a range of 100 meters and rely solely on the cancellation effect produced by the twisted-wire pairs that limits signal degradation. †¢ Shielded twisted pair (STP) – STP cables reduce electrical noise from within the cable since each pair of wires is wrapped in metallic foil to better shield the wires from noise. Four pairs of wires are then wrapped in a metallic braid or foil. Coaxial cable is a copper-cored cable that is surrounded by heavy shielding. There are several types of coaxial cable. †¢ Thicknet or 10BASE5 – used in networks and operated at 10mbps, maximum length of 500 meters. †¢ Thinnet or 10BASE2 – used in networks and operated at 10mbps, maximum length of 185 meters. †¢ RG-59 – Most commonly used with cable television. †¢ RG-6 – Higher quality than RG-59, with more bandwidth and less susceptibility to interference. A fibre optic cable is either a glass or a plastic fibre that carries light along its length. Fibre optic cable can reach distances of several miles before the signal needs to be regenerated. Fibre optic is more expensive than copper cable and connectors are more expensive and harder to assemble than other connections. Wireless Connection Wireless technology is also a greatly utilised technology in business today even though the reliability of wireless connection does not compare to that of a cable connection. Security There are a few different ways to apply security in a network. Some security protocols may be placed during network design and some protocols when the network is running. Network security during the design During the designing of the network, avoid giving anyone outside the implementation team or network designer any information, such as work plans about the network design or the materials that will be used for the network, which will help Vandals infiltrate or use the network inappropriately. Basic security that should be present in a network 1. Firewall will offer a tougher barrier between the private network and the Internet. Firewalls will prevent unwanted users or hackers from accessing the network. 2. Proxy can be used to provide users a way to connect to the proxy server by requesting authentication from the security service during the exchange of files in the network. 3. Antivirus – is used to prevent viruses from penetrating the network and the computers connected to it. It also eliminates the counter-espionage potential within a network. Since there are many antivirus softwares available, the network has the freedom to choose the appropriate antivirus for the network. 4. Strong password encourages all network an   web users to use a password that contains letters, numbers and symbols so as to increase the difficulty of breaking or cracking the password and steal any information from the network. 5. Packaging – cables used to make sure no unauthorized person have access to data and change it. Disaster Planning and Recovery Before setting a network, the manager of the project requires designers and developers of the network to take into account unforeseen circumstances, such as natural disasters and hardware failure, to reduce their impact. Earthquakes, floods, fires and such disasters may be given a solution using the following points †¢ The proximity of cables to main electrical wirings must be significantly distant to avoid fire. †¢ As much as possible, servers must be placed outside the building. Extra security protocols must be applied to avoid losing information. †¢ If a building has multiple servers, it is advised that all servers be placed on an isolated location and away from public gathering places. This will require the development of additional security precautions. †¢ Different types of cables should be considered in setting up a network to maximize its us †¢ Do not put cables near bodies of water or water discharge sa this may damage the cables †¢ Provide rooms with electric generators in case a power outage occurs. Make sure that these rooms are close to their central control devices to avoid technical problems in connecting the machines to the generator. †¢ Provide fire-preventing equipment such as fire extinguishers near the whereabouts of control systems †¢ Provide water and fire alarms to inform personnel if water or fire gets near the data storage devices †¢ The network team should provide a spare or backup server to perform full back up planning after disaster With the increase in number of intrusions and attacks on networks trying to take data and information, a way of protecting these data should be prioritized in a network. Since the data are, most of the time, secret and important to companies, detection and control of intrusions must be strictly implemented. Through the latest presentations that we have done in class, we have learned new techniques and OSI Models that should be taken into account to provide the highest standards of security and quality. Some of these techniques are firewalls, proxies, encryptions, IP security, data authenticity, communications type and satellites.

Sunday, October 27, 2019

Structured query language: Development

Structured query language: Development Abstract Database technology and the Structured Query Language (SQL) have grown enormously in recent years. This paper presents results of the research on the historical perspective of the development of SQL and its continuing development. Applications from different domains have different requirements for using database technology and SQL. This paper also presents an overview on definition of the Standard Query Language, and highlighted the several benefits and produce literature on risks of adopting a Standard Query language. Keyword SQL, DBMS, XML, Data, Database. Introduction Standard Query Language (SQL) is today the standard language for relational and object-relational databases. Application programs commonly include a relatively large number of SQL queries and updates, which are sent to the Database Management System (DBMS) for execution. The most generally used database management systems, such as Oracle, Access, mySQL, SQLserver, Paradox, Ingres, and others, are all claimed to be relational. Certainly, they all use SQL which itself is often simulated to be an indicator of a relational database system. The purpose of this paper is to discuss the historical perspective of the development of SQL and its continuing development. This article also highlighted the benefits and risks of adopting a standard query language. This paper is based on review history of the Standard Query Language and literature on benefit and risks of adopting SQL. Evolution and current situation of the SQL Abreu, et.al. (2006) described that the relational model came about as a result of E. Codds research at IBM during the sixties. The SQL, originally named SEQUEL (Structured English Query Language), was implemented in an IBM prototype (SEQUEL-XRM), during the mid-seventies. Some years later, a subset of this language was implemented in IBMs System-R. In 1979, ORACLE emerged as the first commercial DBMS based on SQL, followed by several other products such as SQL/DS, DB2, DG/SQL, SYBASE, INTERBASE, INFORMIX, UNIFY. Even those which had not originally implemented SQL as their base query language, offered SQL interfaces such as INGRES, ADABAS, SUPRA, IDMS/R. As a result of this process, Standard Query Language became a de facto standard. In late 1982, American National Standards Institute (ANSI) H23 begins to standardize SEQUEL which is version of the relational data model through the IBM language. In 1986, renamed SQL by H2, basic SQL was completed and become an American National Standard and soon an ISO standard. In 1989, the first version of the SQL standard was revised and an addendum, which included main improvements on referential integrity issues, was published. Meanwhile, ANSI brought out a standard for embedded SQL. In the early nineties, a new version, known as SQL2 or SQL-92, was published by ISO. Both the semantic capabilities of the language and error management were then considerably improved. That standard was complemented a few years later, with the approval of SQL/CLI (Call-Level Interface) and SQL/PSM (Persistent Stored Modules). SQL became a complete computational language, with features such as control structures and exception handling. During the last half of the nineties, SQL was extended by the inclusion of object-oriented capabilities. The resulting standard was divided into several parts. This version, previously known as SQL3 and then finally called SQL:1999, incorporated features such as new basic data types for example very large objects, user defined data types, recursive query operators, sensitive cursors, tables generalization and user roles. According to Abreu, et.al. (2006), The latest version of the standard is the SQL:2003, which is there are major revisions and extensions to most parts of the SQL:1999 standard. This version contains SQL/XML which is XML related specifications, new basic data types such as bigint, multiset and XML, enhancements to SQL-invoked routines, extensions to the CREATE TABLE statement, there are new MERGE statement, schema object which is the sequence generator and two new sorts of columns for identity and generated. He also produced the Table 1 as summarizes the evolution of SQL. Table 1 Evolution of SQL Year SQL 70s Relational model DBMS prototypes (SEQUEL XRM) First relational DBMS 80s ANSI SQL-86 standard ISO SQL-87 standard SQL-89 addendum ANSI embedded SQL 90s SQL 92 SQL/CLI SQL/PSM SQL:1999 2003 SQL:2003 Accordingto Wikipedia, thereis another standard produced at 2006 and 2008, The SQL:2006 by ISO/IEC 9075-14:2006 which defines waysfor SQL for conjunction with XML. It also defines how to do storing and importing XML data for SQL, manipulating the data on database and publishing SQL data and XML in XML form. In addition, by use of Query and XML Query Language, it can integrate into their SQL code the published by World Wide Web Consortium (W3C) in order to concurrently access ordinary SQL-data and XML documents. The latest standard is SQL:2008, it legalizes ORDER BY outside cursor definitions. It adds INSTEAD OF triggers and the TRUNCATE statement. Abreu, et.al. (2006) highlighted the SQL:2003 standard is composed of nine parts, which are briefly described in Table 2. The numeration of parts is not contiguous due to historical reasons: some parts have disappeared such as SQL:1999s part 5 SQL/Bindings was included in part 2 of SQL:2003 and other parts are new. The latter resulted either from further partitioning of previous parts such as part 11 was previously included in SQL:1999 part 2 or from the implementation of new requirements, such as parts 13 and 14, dealing with Java methods and XML data, respectively. Since the SQL:1999, the SQL standard has evolved, to support the object-relational paradigm. This paradigm proposes a good compromise between relational and object-oriented databases. The former have a robust data model which is the relational one and powerful query optimization, recovery, security and concurrency mechanisms. The latter incorporate object-oriented mechanisms such as encapsulation, generalization, aggregation and polymorphism, and allow representing more complex elements which are required in several domains, such as CAD, CAM or GIS. Object-relational databases offer the possibility of defining classes or abstract data types, as well as tables, primary and foreign keys and constraints, as relational databases also do. Furthermore, generalization hierarchies can be defined among classes or tables. Table attributes can be defined in a simple domain for example CHAR(25) or in a user-defined class, as a complex number or image. Table 2 Structure and summary of the SQL:2003 standard Part Name Description 1 Framework (SQL/Framework) Overviewof the standard. It describes terms and notation used in the other parts. It also defines the result of processing statements in that language and the grammar of SQL by a SQL-implementation that has been illustrating in the conceptual framework used for other parts. 2 Foundation (SQL/Foundation) Thispart describes the basic operations on SQL-data and data structures. The functional query such as controlling, maintaining, accessing, creating, and protecting SQL-data. It also defines the semantics and syntax of a database language. It deals with the portability of data definitions and compilation units between SQL-implementations and the interconnection of SQL-implementations. 3 Call-Level Interface (SQL/CLI) Itdescribes procedures to execute SQL statements within standard programming language in application written, such the SQL statements will be executed use independent functions. 4 Persistent Stored Modules (SQL/PSM) It defines how the semantics and syntax of a database language has been declare and maintain persistent database language systems in SQL-server modules. 9 Management of External Data (SQL/MED) Extensionsto Database Language SQL is definedfor support management of external data purpose by using data link types and foreign-data wrappers 10 Object Language Bindings (SQL/OLB) Itdefines SQLJQ, which is describes extensions in the Java programming language, for support embedding of SQL statements into programs written. The syntax and semanticsof SQLJ described by this part, as well as mechanisms to make sure binary portability of resulting SQLJ applications. This part also defines a number of Java packages and their classes. 11 Information and Definition Schema (SQL/Schemata) Thispart defines a Definition Schema that characterizes the SQL object identifier, the integrity and structure constraints of SQL-data, the authorization and security specifications associated to SQL-data, the features, sub-features and the support that each of these has in an SQL implementation and also packages of this standard, and an Information Schema. It also includes SQL-implementationinformation and sizing items. 13 Routines and Types Using the Java Programming Language (SQL/JRT) Itdescribes the Java programming language on doing capability of invoking static methods as SQL-invoked routines and SQL structured user-defined types for using classes specified in the Java programming language. 14 XML-Related Specifications (SQL/XML) Thispart describes ways in which SQL also can be used for conjunction with XML. SQL Overview Gardner and Hagenbuch (1983) stated that Relational DBMSs are normally accessed via a data language. In order to allow the DBMS to optimize accesses to the database and to deal with problems related to concurrent access by multiple users, the languages are typically very high level. The SQL is an example of such a language that can be used for that purpose. They also said that SQL statements are non-procedural statements of what data to retrieve, for example the query statements to retrieve employee such as SELECT * FROM EMP , or what operation to perform, for example the query statement to delete some data which is non-queries such as DELETE EMP WHERE NAME = Jones .While simple SQL statements can easily be entered interactively by end-users, the complex sequences of operations required by most applications for example closing the books for the end of month, those are better handled by embedding SQL in a procedural programming language. According to Kuhlemann, et al. (2008) SQL is a database query language used for formulating statements that are processed by a database management system for create and maintain a database. The SELECT statement is the most commonly used by the SQL query which can retrieve data from one or more tables in the database. It can limit the retrieved data using conditional statements in the WHERE clause, the GROUP BY clause can use for group related data and it can limit the grouped data with the HAVING clause; for order or sort data which based on different columns using the ORDER BY clause. He also stated that SQL consists of many statements to create and manipulate database objects. Since its first standardization in 1986, more and more functionality is being included in SQL in each subsequent standard covering a variety of aspects of user interaction. The latest edition of the SQL standard, referred to as SQL:2003, supports various functionality such as call level interfacing, foreign-data wrappers, embedding SQL statements in Java, business intelligence and data warehousing functions, support for XML, new data types, etc. The next standard, called SQL 20071, it will most likely add features like regular expression support, binary and outing decimal data types, materialized views, streaming data support, XQuery support and support for the Resource Description Framework (RDF) and the semantic web. Many researchers have led the huge scope of SQLs functionality to advocate the usage of a `scaled down version of SQL, especially for embedded systems. The hardware limitations such as small RAM, small stable storage, and large data read/write ratio come up from embedded systems. Also the applications where embedded systems are used, for an example such as healthcare and bank cash cards, need only a small set of queries like select, project, views, and aggregations. Kuhlemann, et al. (2008) described that a standard called Structured Card Query Language (SCQL) by ISO considers inter-industry commands for use in smart cards with constrained functionality of SQL. This issue has been proposed to address by some database systems and SQL engines. They are distinguished as `tiny, e.g., the TinyDB2 database system, for extracting information from a sensor network and tinySQL3 SQL engine, which is a Java SQL engine that supports only a few SQL statements like select, update, insert, delete. While the standardization process shows how SQL has increased in size and complexity in terms of features provided, efforts for `scaled down versions show a need to control and manipulate features of SQL. Gardner and Hagenbuch (1983) stated that SQL is a data language designed for use with the relational data model. The executable unit of SQL is the statement, but there are no SQL programs. SQL statements execute in the context of a single enrolled user of the database. The context in which a statement executes chooses what advantages it may exercise on objects in the database. Just only one or two contexts will be absorbed by an application program. Many SQL statements may run within each context. Each statement isdescribed by the DBMS, i.e., prepared for execution. Catrambone and Yuasa (2006) cited in (Smelcer, 1989) described that the Structured Query Language for databases, which sometimes referred to as the ‘‘Standard Query Language, is a command language for relational databases. It was preferred here as the test domain because writing a query with SQL is a relatively complicated task and because the knowledge required to write queries can be fully specified. Moore (1992) said that â€Å"SQL† was once an acronym for the â€Å"Structured Query Language† which was associated with a propriety implementation. When SQL is used to refer to the ANSI standard, it is no longer an acronym, simply a short form of â€Å"Database Language-SQL†. Benefits of adopting SQL Donaho and Davis listed that several features make Standard Query Language at least as good as any other query language currently in use : The basic concepts and syntax of SQL are easy for learned. This short initial learning period can decreases the amount of training required and it also can increases productivity. SQL is a reasonably high-level language. The programmer can write queries without knowing all of the intimate details of the DBMS implementation. For example, a SELECT clause allows the user to identify the needed data without indicating how to access it. SQL associate the data definition and data manipulation languages. Unlike other query languages, SQL uses the same syntactic constructs for definition functions and manipulation functions. This regularity makes the language easier to learn and use. SQL provides the functionality needed for most database applications. That is, the language is powerful enough to do most of the things required in a database application. According to Biggar, Chawla and Meese (2009), other benefits of adopting SQL include: Lower capital and operational costs by reduced IT footprint, easier management, storage platform features and licensing advantages. Improved agility and manageability by isolating application workloads on the storage system, providing heterogeneous storage support, and allowing live automated provisioning of storage. Higher availability by simplified backup and recovery, availability during server maintenance, failover support through physical host clustering, and business continuity or disaster recovery. Hoffer (2009) also stated the benefits of SQL are as follow: Reduced training cost, training for organization can focus one language only. Productivity, IS professionals become more proficient and learn SQL with it from continued use. They can increase the productive, usually programmers can more rapidly maintain the existing program. Application portability, when each machine uses SQL the applications can be moved from machine to machine. Application longevity, when new versions of DBMSs are introduced and the standard of language is enhanced, the applications will simply be updated. Reduced dependence on a single vendor, which may lower prices and improve service because of the market for such vendors can become more competitive,. Cross-system communication, managing data and processing user programs can become more easily communicated. Risks of adopting SQL Maciol (2008) stated that SQL has a row of limitations coming from its foundations such as: It is difficult for defining terms and lists. There is limitation of atomic data. Lack of repetition and iteration. Limited possibilities of data processing control. Lack of deduction possibility. Chan, Lu and Wei (2003) listed the problem while using SQL : Comprehension difficulty : Complex queries are not easy to analyze, usually by another person. The nested maze is quite confusing. This confirms one of the theoretical flaws of SQL not well defined semantics for nesting (Codd 1990). Multiple joins of many tables can lead to uncertainty of the query accuracy. Logical errors are difficult to detect, as compared to 3GLs. Formulation problem : Joins are difficult for end-users. Too many aggregate functions in a single query have led to problems. Use of wrong field and name definition. Unable to format the output as desired. Variables used with wrong variable types, especially for embedded SQL. Performance Response is slow when system does not select the best path to access tables. Database contention occurs by simultaneous accesses A query may need to be broken into smaller queries to speed up processing time. This requires more temporary space. Unclear error message sometimes give wrong impressions. They also stated that usually whenusers encounter problems with SQL, the majority refers to the manual. This also confirms the finding that manuals form a substantial secondary source of SQL knowledge. Mostly prefer try to find the assistance of colleagues or superiors. Only a minority, attempt to query with other languages, while less will try another means, one of which was to try until get it right, to SQL manuals. Brass and Goldberg (2005) highlighted that errors in SQL queries can be classified into syntactic errors and semantic errors. A syntactic error means that the entered character string is not valid SQL. Then there are print an error message because it cannot execute the query by any DBMS. Thus, the error is easy to correct and definitely detected. A semantic error means that a legal SQL query was entered, but the query does not or not always produce the intended results, and is therefore incorrect for the given task. Semantic errors can be further classified into cases where the task must be known in order to detect that the query is incorrect, and cases where there is sufficient evidence that the query is incorrect no matter what the task is. Kiefer and Nicola (2009) observed that the adoption of SQL/XML faces several challenges. When relational legacy applications need access to new XML data, it is often too expensive to convert them from SQL to SQL/XML. Another frequent challenge is to actually write queries and updates with SQL/XML and Query. There are numbers of problem can occur such as: Users need to learn these new languages, which are often perceived as difficult to master. This stems from the differences between the XML data model and the relational data model. SQL/XML involves path expressions that navigate the tree structure of XML documents. To write path expressions, users must know the structure of the XML data in detail. It is not enough to know which data items exist, it is also necessary to know their exact case-sensitive name, namespace, and location within the document structure. But, this structure is often complex, difficult to understand, or even unknown to the user. As more XML documents are accumulated in a database, newer documents may have a different XML Schema than older ones. This requires queries and updates to work across documents for different schemas, which compounds the complexity of writing SQL/XML statements. Also, existing XML queries may need to be changed when the XML Schema evolves. In a hybrid database, where some data is stored in relational format and some in XML format, users need to know which data is in which format before they can write correct queries. Conclusion The SQL (Structured Query Language) is presently available for most database management systems. The SQL:2008 is the latest standard whichlegalizes ORDER BY outside cursor definitions. It also adds INSTEAD OF triggers and the TRUNCATE statement. This paper present briefly overview history of Standard Query Language, it also analyze benefits and risk of adopting SQL. There are benefit of adopting SQL such as lower capital and operational costs, improved agility and manageability and higher availability. There are many risk occur when adopting SQL, but usually the user can easily handle that risks. In future work, it can investigate patterns for SQL queries in greater detail such as analyzing SQL queries from real projects. References Abreu, F.B., Baroni, A., Calero, C., Piattini, M. (2006). An ontological approach to describe the SQL:2003object-relational features. Computer Standards Interfaces, 28, 695-713. Biggar, H., Chawla, A., Meese, L. (2009). The Benefits of Virtualizing Microsoft ® SQL Server ® in Hitachi Storage Environments. http://www.hds.com/assets/pdf/the-benefits-of-virtualizing-microsoft-sql-server-wp.pdf. Brass, S., Goldberg, C. (2005). Semantic errors in SQL queries: A quite complete list. The Journal of Systems and Software, 79, 630-644. Catrambone, R., Yuasa, M. (2006). Acquisition of procedures: The effects of example elaborations and active learning exercises. Learning and Instruction,16 , 139e153. Chan, H.C., Lu, H., Wei, K.K. (1993). A Survey on Usage of SQL. Sigmod Record, Vol. 22. Davis, G.K., Donaho, J.E. Ada-Embedded SQL : the Options. Vii.3-72. Gardner, M., Hagenbuch, B. (1983). Interfacing Apl And Sql. .ACM, 0-89791-095-8/83/0400-0109. Hoffer, J.A., Prescott, M.B., Topi, H. (2002). Modern Database Management. New Jersey : Pearson Education. Kiefer, T., Nicola, M. (2009). Generating SQL/XML Query and Update Statements. ACM,978-1-60558-512-3/09/11. Kuhlemann, M., Saake, G., Siegmund, N., Sunkle, S., Uller, M.R. (2008). Generating Highly Customizable SQL Parsers. ACM, 978-1-59593-964-7/08/03. Maciol, A. (2008). An application of rule-based tool in attributive logic for business rules modeling. Expert Systems with Applications, 34, 1825-1836. Moore, J. W. (1992). Minimizing the disadvantages of embedded sql/ada. ACM, 0-S9791-529-1 /92/0011-0407. Wikipedia, the free encyclopedia http://en.wikipedia.org/wiki/SQL.

Friday, October 25, 2019

Free Essays - Comparing Young Goodman Brown and Soldier’s Home :: comparison compare contrast essays

Young Goodman Brown:   Going Home    My home is my haven and the place that I feel the safest and most comfortable at. It is where many good memories and feelings arise and I am able to be myself with no false pretenses. It is my â€Å"Home Sweet Home† yet the stories â€Å"Young Goodman Brown,† by Nathaniel Hawthorne, and â€Å"Soldier’s Home,† by Ernest Hemingway show a different attitude about home going and the effects it has on the main characters.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In Hawthorne’s story, â€Å"Young Goodman Brown,† Goodman Brown ventures on a journey into the forest and refuses the temptations of the devil. Unfortunately though, throughout the night, Brown finds out more than he ever wanted to know about how his fellow Puritan townsmen, including his wife, have betrayed their faith by giving into their dark desires. In utter despair, Goodman Brown returns at dawn to his Salem village â€Å"staring around him like a bewildered man.† (Hawthorne, pg.275) He doesn’t believe it is the same place as it was the night before and he no longer feels at home. Whether his experiences were real or not, his faith is gone and he feels as though he is the only pure one. He suffers tremendous guilt and discomfort and trusts no one. His excessive pride is evident when he takes a child away from a blessing given by Goody Cloyse, his former catechism teacher, as if he were taking the child â⠂¬Å"from the fiend himself.† (Hawthorne, pg.276) His distrust and resentment towards his townsmen is apparent when he sees his wife, Faith. She is overwhelmed with joy to see him arrive home yet he looked â€Å"sternly and sadly into her face and passed on without a greeting.† (Hawthorne, pg.276) All that he learned in the night was too much for him, and it changed a devoted husband with bright hopes and a wife whom he loved, to a tired, beaten, questioning and almost faithless man.       Harold Krebs in Hemingway’s â€Å"Soldier’s Home,† returns from World War I to a society that he no longer feels a part of and receives no welcome for his heroic deeds. He resents being home which is largely due to the fact, that during the war he led a very simple lifestyle and upon returning home is thrust back into a complicated domestic life.   He tries to seek refuge by withdrawing from society and engages himself in individual activities.

Thursday, October 24, 2019

Reaction Paper About the Guest Speaker

Reaction Paper about the Guest Speaker Last Wednesday, September 5, 2012, was our National Science Month Celebration with the theme: â€Å"Science in the K-12 curriculum, sustaining a better future. † Our guest speaker was born on July 15, 1965 in Cotabato City. She finished her study on Western Mindanao State University in 1978 as third honourable mention. She passed the examination for the qualifications on studying in Philippines Science High School and studied in Philippines Science High School-Diliman as a DOST scholar. She studied BS Agricultural Engineering in UP Los Banos on 1988 and passed the board exam as ninth placer.I was so amazed when I heard that the person in front of us talking got ninth place on an Engineering Board Exam. She is now a Provincial Science Officer in Cotabato Province. Her husband is Condo N. Pham Jr. and has 4 children. She is non-other than Engr. Normina B. Pham. Her topic is about innovation. She also shared about their reunion. Engineer sai d that in more than 240 elementary students passed the examination in Philippines Science High School, only 175 students graduated. Her classmates are now Vice President of Ateneo, bosses of young stars today, scientists that are finding cure to vaccines, AIDS, HIV and etc.She also talked about the birth of call center ten years ago. The call center’s birth is also the birth of cybersex which has clients all over the world. She also said that innovation must be replicated. You must deliberate the information you’ve got, have imagination and initiative. Students are more productive on imagination than teachers. She said that we should bring in changes in our community. Do better in what you are doing now. And I quote, â€Å"The Future depends on you. † -Reyel Joy E. Gauran III-Emerald

Tuesday, October 22, 2019

How to make a good impression at acollege Essay

Style of dressing for college varies from place to place, culture to culture, environment to environment, so I can’t recommend you a specific type of dress or style of dressing, instead I had an exclusive and powerful tip for you to determine â€Å"what type of dress you have to wear on first day of college to give a great first impression†. Visit your college before first day or observe senior students of your college and check their dressing style to decide what suites you on first day of your college and in which dress you can make good first impression. Your look First thing counts in your first impression is your look because visual works much more earlier than the any other impression For males I suggest shiny hairs, fresh look and well shaved, smiling and charming face. For females light look, unique hairstyle and updated fashion works well. Neatness and uniqueness are the plus points to create good first impression on the first day of college. Hand carry Choosing your hand carry or college bag is simply recommended to be comfortable and light to carry preferably better suites your personality (height, weight). To get out of confusion you can also take help from your observation of senior students of your college, but I recommend you not to copy them instead develop a unique style of your own to choose college bag or to handle it. Selection of shoes Shoes recommended to wear on first day are that pair of your collection which suites you most and you can feel comfortable in them so you are then able to give your concentration to other necessary matters of giving good first impression instead of fighting with shoes. First day of the college Now come to some simple points you must have in your mind on the first day of college to make a good and powerful impression. Be punctual First thing is be on time. Embed your self in the new environment Don’t worry about finding yourself on the new environment; feel free and easy because those who will meet you are also humans. I had observed myself that many students at first day of the college are terrified that how they face new persons and new place, I suggest you to be normal and feel pleasant to make great impression on first day you must avoid any shyness and don’t be afraid and terrified. Your confidence Take care of your self-confidence its help you to face new environments and persons. Self-confidence doesn’t mean to be overconfidence; it may ruin your good first impression. Be careful about your self respect, self respect is in your hand. Be mature I suggest you to act more mature then other students so you can impress them and make a good start of your college life. Use your smile Use curve of smile to make the new problems and complexions straight. Step by step method of how to make good first impression on your first day of new job First impression Use your body language as a powerful weapon to create good first impression on others but remember not to over act. Handling your face impressions in front of others helps you great on the first day of your college. Manners have their own importance in expressing yourself to others, I suggest you to be well mannered with your fellows and teachers. I think you also known to the most famous saying that â€Å"first impression is the last impression† so observe it and follow it and give your best on every person you met in your college. Place yourself on your teachers place and observe yourself from his/her eyes, it helps you greatly in creating your first impression. Talk and treat politely Politeness attract everyone, keep it in mind don’t prefer to be harsh, it may break hearts. Don’t ever think that others are fools, remember that they also have minds and they can notice any foolish thing done by you. Be friendly and try to blend yourself in those whom you like on first sight. Speaking more then need isn’t good on the first day, lose talking and your volume matters greatly in making your good first impression on the first day of college. Be social Check names of all your teachers and try to meet them and introduce yourself to them personally, it’s a tip I have tried myself in college and after effects of this great first impression on my teachers are so good that I can’t have words to tell you that how much my this act of meeting personally on the first day of college works on my teachers. Try to recognize your fellows, who are going to be in future on your side and who are going to start competition with you in future. Try to recall the names of new fellows. Initial days are most important to create great first impression on your teachers and professors, so use these days to make an impression of brilliant and genius student in front of them, give them your company and be active before them and show yourself a bright and corporative student of your class. Your laugh Laughing a number of times harms your first impression on the first day of college but smile leaves some better points to you. Simple planning Configure your position in the class and seat to sit; it helps you to plan better for the further college life. Your first impression A smart and useful course on methods, tips, techniques and ways you need to build and improve your s Don’t be over smart One point that I had faced during first day of my college is that I tried to be over smart and think â€Å"what I know is unknown to others†, later I came to know that I was totally wrong and big fool, because of my that mistake I now recommend every student going to college â€Å"Please don’t be over smart in first days of college†. Be prepared for odds Be prepared for any ragging or teasing by seniors, I think its better to manage some distance from your seniors who wants to tease you in initial days of college. If you accidently caught by them face them calmly and don’t bother and feel unconfident. Take everything openly and recognize it with open mind don’t hyper of little troubles and problems which comes to as new student of the college. Check your studies Check out your subjects; if anyone comes to your interest, consult it, be active on that subject to create a good first impression in initial days of college, discuss that subject with teachers and fellows to be social. If you feel that some subjects are hard for you, don’t take tension, try to give them your concentration, I hope you can do it but in all cases keep yourself calm and please don’t bother. If you feel insecure, give your self time and take deep breath to boost yourself against the new challenges, feeling free is the main thing you need to prepare for the great first impression on the first day of college. Remember no one come to help you, in college you alone have to help yourself, so be prepared. Be social and try to discuss with others about different matters, there is nothing to worry about on the first day of college.