Saturday, August 31, 2019

Srs of Library Management

| |Software Requirements Specification | For A-Flex Automated Library Management System Version 1. 2 Prepared by A-FLEX Group |Jude Marlon B. Alegro |111694 |[email  protected] com | |Arnel G. Abagua |082198 |[email  protected] com | |Jun Jun G. Abanag |102206 |[email  protected] om | |Ronaldo R. Arbes |061491 |[email  protected] com | |Amado C. Tan |101078 |[email  protected] com | | | | | |Instructor: |Prescilla F.Catalan | |Course & Year: |BS in Information Technology 3 | |Schedule: |TTH 7:30 – 9:00 AM | |Date: |April 16, 2013 | | | | Table of Contents title pagei table of contentsii table of figuresiii Revisionsiv 1Introduction5 1. 1Document Purpose5 1. 2Product Scope5 1. Definitions, Acronyms and Abbreviations5 1. 4References6 1. 5Overview6 2Overall Description7 2. 1Product Perspective7 2. 2Product Functionality8 2. 3Users and Characteristics8 2. 4Operating Environment9 2. 5Design and Implementation Constraints9 2. 6User Documentation10 2. 7Assumptions and Depen dencies10 3Specific Requirements11 3. 1External Interface Requirements11 3. 1. 1User Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 2Hardware Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 14 3. 1. 3Software Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 14 3. 1. 4Communication Interfaces†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 15 3. 2Functional Requirements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 3. 2. 1Librarian Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 3. 2. 2Clerk Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 19 3. 2. 3Borrower Use Cases†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 24 4Other Non-functional Requirements27 4. 1Performance Requirements27 4. 2Safety and Security Requirements27 4. 3Software Quality Attributes28 4. 3. 1Functionality†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 28 4. 3. Usability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 28 4. 3. 3Reliability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 4. 3. 4Supportability†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 Appendix A – Data Dictionary. 30 Appendix B – Group Log. 31 InDEX. 33 Table of Figures Figure 1 Context diagram7 Figure 2 Operating environment9 Figure 3 Main interface11Figure 4 Logging station for Librarian12 Figure 5 Clerk station for connection13 Figure 6 Clerk station14 Librarian Use Cases15 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 15 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 16 Search book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 17 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 18 Clerk Use Cases19 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 19 Log out†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 9 Search book †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â ‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 20 Issue book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Return book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 21 Add book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 Update database†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 23 Borrower Use Cases24 Log in†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 24 Borrow book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 24 Retu rn book†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 5 Revisions |Version |Primary Author(s) |Description of Version |Date Completed | |1. 2 |Jun Jun G. Abanag, Jude |The revision of this SRS was done by request. Error |04/16/13 | | |Marlon B. Alegro |corrections to some parts of the document were needed to fully| | | | |complete an accurate Software Requirements Specification.Some| | | | |specified features were removed because it was uncompleted due| | | | |to lack of time and preparation. Some small details in | | | | |chapters were also corrected and Content page was revised. | | | | |Finally, to finish the SRS, then Appendix B and Index were | | | | |added. | Introduction 1 Document Purpose This Software Requirements Specification will provide a c omplete description of all the functions and specifications of the project, A-Flex Automated Library Management System. It will explain the purpose and the features of the system, the interface of the system, what the system will do, the constraints under which it must operate and how the system will react to external stimuli. This document is intended for both of the stakeholders and the developers of the system and will be proposed to the College Library of Samar College. Product Scope The A-Flex Automated Library Management System will be designed for the librarian, the staff and clerks and especially for the students of SC Library to maximize their productivity by providing tools to assist in automating the: production and transaction; logging in; monitoring materials; borrowing and returning of books and other library materials; assessing the overdue; inventorying; and creation of statistics and reports, which otherwise have to be performed manually in an ordinary daily basis.M ore specifically, this system will allow a certain user to manage, organize and monitor the data and attendance of the clerks, the status of the books and other library properties and the library records of the registered students to the library. Nevertheless the access to these capabilities will depend on the user privilege of an account. It will automatically provide statistical reports based on the data stored in its associate database which is updated consistently. Therefore the software will give an ease to do these tasks that are vital in managing the library. Definitions, Acronyms and Abbreviations |Term |Definition | |Borrower |Any person who wishes to borrow books inside the school library. | |Clerk |Any person who assists the librarian in minor tasks needed performed inside the library. | |Database |A collection of all data produced by the system. | |Librarian |A person who is assigned responsible in generally managing the school library. |QR Code |Quick Response code, a type of bar code/encrypted code that will be used for the project in identification | | |purposes. | |Requirements |Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC |Abbreviation of the name of the school where the system will be proposed. The Samar College | |SRS |Software Requirements Specifications.A document that completely describes all of the functions of a proposed| | |system and the constraints under which it must operate. For example, this document. | |Stakeholder |Any person with an interest to the project but is not a developer. | |User |Any person who operates or interacts directly with the product. | |VB |Visual Basic, a building/programming software used in creating the system | |XAMPP |An application used to have a connection between the product and its database. 4 References IEEE. IEEE Std 830-1998 IEEE Recommended Practice for Software Requirements Specifications. IEEE Computer Society, 1998. [IEEE] The applicabl e IEEE standards are published in â€Å"IEEE Standards Collection,† 2001 edition. [Bruade] The principal source of textbook material is â€Å"Software Engineering: An Object- Oriented Perspective† by Eric J. Bruade (Wiley 2001). [Reaves SPMP] â€Å"Software Project Management Plan Jacksonville State University Computing and Information Sciences Web Accessible Alumni Database. † Jacksonville State University, 2003. 5 OverviewThe next chapter, the Overall Description section, of this document gives an overview of the functionality of the product. It describes the informal requirements and is used to establish a context for the technical requirements specification in the next chapter. The third chapter, Requirements Specification section, of this document is written primarily for the developers and describes in technical terms the details of the functionality of the product. Both sections of the document describe the same software product in its entirety, but are i ntended for different audiences and thus use different language. Overall DescriptionThis section provides a more detailed overview of the system, including a description of the product’s functions and overarching constraints. 1 Product Perspective A – Flex Automated Library Management System Figure 1 – Context diagram As shown in the Figure 1, A-Flex Automated Library Management System (A-Flex ALMS) is independent from other system and has three active actors and one database (where all information is stored and retrieved from). The Borrower, Clerk and the Librarian have a privilege to access the library system. However, the Librarian alone has the privilege to access the database, i. e. eleting, updating and/or adding such records and making reports. A-Flex ALMS uses Interaction Model, a Use Case Diagram, to make stakeholders easily view the system operation. 2 Product Functionality The product has the following major functionalities: †¢ Automated logging in of students into the library †¢ Automated borrowing and returning of books †¢ Enables to show the status of the books †¢ Enables the clerk to customize the due time of returning books for photocopying purpose †¢ Enables the user to search for a particular book using the system’s specialized built-in search engine †¢ QR code scanner functionality Database data storage 3 Users and Characteristics There are essentially three users for the system and are expected to be computer-literate: the borrower, as this project is being made so obviously the main client for this system who wishes to borrow materials in the library. The students of the school are not only the borrower, faculty and other employees of Samar College who are in the list of the school’s employees, for confirmation, may borrow books if they give envelop to librarian, this envelop will serve as their record of borrowing. The borrower may also be a student from other schools, that are required to register (P 50. 0) to school’s registrar to access a privilege and utilize the offered 8 hours services; the librarian, the main user of the system who manages the library and its database and responsible for activities such as adding book records, deleting book records, updating book status such as if book is issued and etc. ; the clerk, the assistant librarian and secondary user of the system who has a privilege to lend books, they are expected to have a different privilege as to librarian. 4 Operating Environment XAMPP Link from proposed system Figure 2 – Operating environmentThe system will be operated in the Samar College Library, as it was proposed to. When the user interacts into the system, the system will pass the user to the database, through XAMPP v. 3. 0. 12 which allows Windows program to transfer data to and from the database to record every interaction of the user. 5 Design and Implementation Constraints The current constraints on the pro ject are related to the provision of hardware resources to implement and test high-performance features. At present, an Intel Dual-core processor is needed, with a 2 GB RAM, serves as the server, with XAMPP running on top of the Windows 7 operating system.For better performance analysis, a number of dedicated workstations would be beneficial for the student workstation. The hardware that the project will be running on may constrain some design decisions pertaining to real-time and performance, as well as the scanner’s accuracy. Also, certain required hardware within the library imposes specific requirements on the project. The following is a list of constraints pertaining to the accuracy of the library system: †¢ The information of all the users must be stored in a database that is accessible by the system. The students must have logged in upon entering the library before they can borrow materials or books. †¢ The librarian only has the privilege and responsibility for the system’s security and privacy. †¢ Clerk and librarian have different privileges upon using the system. †¢ LAN is not implemented. †¢ BIOS of the system unit should be working to get the real-time in issuing of the books to the borrowers. 6 User Documentation The user can easily understand of the usage of the system with a user’s manual to be delivered with the system.The manual would be helpful with the some screen shoots within it. User can easily learn operation of the system by displaying corresponding shortcuts on controls for simple task. Contacts numbers of the developers will be given to the school librarian for further assistance when complex problems arise. 7 Assumptions and Dependencies A number of factors that may affect the requirements specified in the SRS include: †¢ The users have sufficient knowledge of computers. †¢ The users know the English language, as the user interface will be provided in English. Hardware and syst em specifications might not compatible. †¢ System might not supported by the operating system. †¢ It is assumed that librarian and/or clerk might forget their password for logging in. Specific Requirements 1 External Interface Requirements Below is a list of enumerated requirements that provides additional specifications for the behaviour and functionality of the system. 1 User Interfaces Using this system is fairly simple and intuitive. A user, who has a familiarity with basic logging in navigation, should be able to understand all functionality provided by the system.As Figure 3 shows, the user with different privileges can now select his workstation, with corresponding shortcuts for options, so that the system may give the user an access to these and may let the not be able to use those of privilege he usually should not have. [pic] Figure 3 – Main interface If the user selects the Open Librarian (Ctrl + L), system now then identify him as Librarian, a Server, an d Figure 4 will display with a pop-up form that lets the Librarian to have a three (3) attempts of logging in. If the user failed to log in successfully, system then will automatically shuts down. pic] Figure 4 – Logging station for Librarian If the user selects the Open Clerk (Click + C), system now then identify him as Clerk and Figure 5 then will display asking for an IP address sin order to have a connection to Librarian Workstation, server. [pic] Figure 5 – Clerk station for connection As the Clerk workstation has successfully connected to its server, then Figure 6 now will be displayed. Letting the Clerk to log in, as same of Librarian, if the Clerk failed to log in successfully it will automatically shuts down. [pic] Figure 6 – Clerk station 2 Hardware InterfacesSince the system will be installed in a Local Area Network (LAN) for collecting data from the users and also for updating the Library System and making reports, it is recommended by the developers , in order to have a maximum usage of the system, that the library should have the following: †¢ at least one camera for students’ easy logging in and scanning of books; †¢ printer for making reports; and †¢ computer unit(s) for the Clerk Workstation(s). The librarian then has to decide the number of units whether the library’s clerks would use. 3 Software InterfacesThe system will use only one external software, XAMPP v. 3. 0. 12, for the connection between the system and database. The system has a built in QR (Quick Response) Code Reader. 4 Communications Interfaces The system will be installed and run in a LAN of computer units. 2 Functional Requirements This section provides the detailed list of all product operation with their corresponding specific use case. 1 Librarian Use Cases 1 Use case: Log in Diagram: Brief Description The Librarian accesses the system, and can do various tasks. Initial Step-By-Step DescriptionBefore this use case can be init iated, the Librarian has already set up or prepared the units to be used. 1. The Librarian hits Ctrl + L, the option log in for a Librarian. 2. The system displays the pop-up login for the Librarian. 3. The Librarian selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Librarian is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Librarian selects the OK button. 4. The system records the info into the database. 5. The Librarian has logged out. 3 Use case: Search book Diagram: Brief Description The Librarian gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Librarian has already successfully logged in. 1. The Librarian selects the form fo r books, borrowers, etc. then chose the book. 2. The system displays the list of books and shows the different categories. 3.The Librarian selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 6. 4 Use case: Issue book Diagram: Brief Description The Librarian is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Librarian confirmed the borrower that he has a validated registration. 1. The system Librarian searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. a.If the book’s copy is more than one (1) and is available, the Librarian sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Librarian that the requested book(s) is not available and thus will automatically gives the re ason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirmation that the transaction is successful. 5 Use case: Update database Diagram: Brief Description The Librarian wanted to do some tasks the he/she needed the data be manipulated in the database.He or she also can update the database. Initial Step-By-Step Description Before this use case can be initiated, the system has verified that the Librarian is logged in. 1. The system displays categorized options of the entire data. 2. The Librarian selects the category. 3. The system gives other options of that selected category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched selected category. 2 Clerk Use Cases 1 Use case: Log in Diagram: Brief Description The Clerk accesses the system, and can do various tasks.Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already set up o r prepared the units to be used. 1. The Librarian hits Ctrl + C, the option log in for a Clerk. 2. The system displays the pop-up login for the Clerk. 3. The Clerk selects the log in. 4. The system records the info into the database. 2 Use case: Log out Diagram: Brief Description The Clerk is signing off the system. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk clicks his name at the left top of the form. . The system displays the pop-up confirmation for log out. 3. The Clerk selects the OK button. 4. The system records the info into the database. 5. The Clerk has logged out. 3 Use case: Search book Diagram: Brief Description The Clerk gets the list of books and info. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has already successfully logged in. 1. The Clerk selects the form for books, borrowers, etc. then chose the book. 2. The system displays the list of book s and shows the different categories. 3.The Clerk selects the category. 4. The system gets the selected category to dataset and at the same time records it. 5. The system displays the matched book(s). 4 Use case: Issue book Diagram: Brief Description The Clerk is able to issue the book(s) to the borrower(s). Initial Step-By-Step Description Before this use case can be initiated, the Clerk confirmed the borrower that he has a validated registration. 1. The system Clerk searches the books in the list. 2. The system displays the list of books and shows whether the book is listed and/or available. . If the book’s copy is more than one (1) and is available, the Clerk sets the due date/time. b. If the book is not available due to some reason, the system will automatically alerts the Clerk that the requested book(s) is not available and thus will automatically gives the reason(s). 3. The system gets the due date/time to be recorded to the database. 4. The system will give a confirma tion that the transaction is successful. 5 Use case: Return book Diagram: Brief Description The Clerk returns the book he/she has borrowed. Initial Step-By-Step DescriptionBefore this use case can be initiated, the Clerk, now as borrower, must return the book on time. 1. The Clerk himself may return the book he has borrowed. 2. The Clerk selects the Borrowed tab on the Borrowed form. 3. The system will display on the grid the borrowed books including his book. 4. The Clerk may scan the book with QR Code, or he may manually put the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the clerk wasn’t able to return the book on time. 6. The system records info into the database.Note: All Librarian assistants in the school’s library are working students, so therefore they may somehow be a â€Å"borrower†. 6 Use case: Add Diagram: Brief Description The Clerk adds some info, it might be addi ng books or borrowers to the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk has given permission from the Librarian and thus he has already data to be stored in the database. And he has successfully logged in to the Clerk’s form. 1. As he logged in, the clerk clicks the â€Å"Add† tab on the Clerk’s workstation. 2.The system displays an option on whether what the clerk wants to add or store. 3. The clerk chooses an option. 4. The system displays needed data to be filled out whether it’s either a new book or new borrower. 5. The system then evaluates the input before storing to the database. a. If the required data is completed, the system displays a message box as notification of a new data. b. If some required data is missing, otherwise, a message box will be displayed to notify that some important data are not properly filled out. 7 Use case: Update database Diagram: Brief DescriptionThe Clerk modifies some d ata that are stored in the database. Initial Step-By-Step Description Before this use case can be initiated, the Clerk scanned some info, might in the book or borrower, and is incorrect. 1. The Clerk selects the â€Å"Update† tab on the Clerk’s workstation. 2. The system displays the pop-up options of the data to be updated to be edited. 3. The system displays the info that the Clerk wanted to update. 4. After the Clerk verified the correct records, the system then will display the updated data of a specified record. 3 Borrower Use Cases 1 Use case: Log inDiagram: Brief Description The Borrower, if student, logs in through the scanner by swapping their IDs with QR Code. Otherwise, if the scanner is not available he can manually input his student number. The faculty who wants to borrow has no record of logging in but they have to provide an envelope that the librarian refers to. Initial Step-By-Step Description Borrower enters the library. 1. The Borrower looks for the needed book(s) to borrow. He can ask the clerk to search the book(s) through the system. 2. The system displays the possible results for the input info. Use case: Borrow Diagram: Brief Description The Borrowers, either a student or faculty, borrows their needed book. Initial Step-By-Step Description Before the Borrower can have the needed book(s), he successfully logged in inside the library. 1. The Clerk selects the tab for borrowing within the Clerk’s workstation. 2. The system displays the required data to be filled out for the borrowing. 3. After the Clerk or Librarian hits the OK button, the system will evaluates the borrower if he or she has due book(s) that not yet been returned. 4.The system displays the notification and due date and time of the borrowed book(s) upon the request of the Clerk for borrowing the book then records it to the database. 3 Use case: Return Diagram: Brief Description The Borrower returns the book he or she has borrowed. Initial Step-By-Step De scription Before this use case can be initiated, the Clerk Borrower must log in inside the library. 1. The Borrower asks anyone among the Clerks for returning assistance. 2. The Clerk selects the â€Å"Borrowed† tab from the Borrowed form. 3. The system will display on the grid all the borrowed books including his book. 4.The Clerk may scan the book with QR code or he may manually input the accession number of the book. 5. The system them will check for its due date and time, evaluates the time consumed for penalty if the Borrower wasn’t able to return the book on time. 6. The system records info into the database. Other Non-functional Requirements 1 Performance Requirements 1. Response Time – The Splash Page should be able to be load within seconds using a Windows 7 32-bit Operating System and at least 1 GB memory (RAM). The information is refreshed every two minutes. The access time for the computer unit should be less than a minute.The system shall respond to the member in not less than two seconds from the time of the request submittal. The system shall be allowed to take more time when doing large processing jobs. 2. Administrator/Librarian Response – The system shall take as less time as possible to provide service to the administrator or the librarian. 3. Throughput – The number of transactions is directly dependent on the number of users, the users may be the Librarian, employees of the Library and also the people who use the Library for checking-out books, returning books and checking library account. . Resource Utilization – The resources are modified according the user requirements and also according to the books requested by the users. 2 Safety and Security Requirements The server on which the Library System resides will have its own security to prevent unauthorized write/delete access. There is no restriction on read access. The use of email by an Author or Reviewer is on the client systems and thus is ext ernal to the system. The PC on which the Clerk resides will have its own security. Only the Editor will have physical access to the machine and the program on it.There is no special protection built into this system other than to provide the editor with write access to the Library System to publish reports. 3 Software Quality Attributes 1 Functionality Logon Capabilities The system shall provide the users with logon capabilities. Alerts The system can alert the Librarian or the administrator with notifications regarding the status of the books and in case of any problem. 4 Usability †¢ The system shall allow the users to access the system from a stand-alone client or its derivative technologies for public inquiries of the students.The system uses another computer unit for the client interface. †¢ The system is user friendly. 5 Reliability The system has to be very reliable due to the importance of data and the damages incorrect or incomplete data can do. Availability The s ystem is available 100% for the user. The system shall be operational 8 hours a day and 7 days a week. Accuracy The accuracy of the system is limited by the accuracy of the speed at which the employees of the library and users of the library use the system. Access Reliability The system shall provide 100% access reliability. 10 SupportabilityThe system designers shall take in to considerations the following supportability and technical limitations. Information Security Requirement The system shall support the information security requirements. Maintenance The maintenance of the system shall be done as per the maintenance contract. Standards The coding standards and naming conventions will be as per the American standards. Appendix A – Data Dictionary |Borrower – Any person who wishes to borrow books inside the school library. | |Clerk – Any person who assists the librarian in minor tasks needed performed inside the library. |Database – A collection of all data produced by the system. | |Librarian – A person who is assigned responsible in generally managing the school library. | |QR Code – Quick Response code, a type of bar code/encrypted code that will be used for the project in identification purposes. | |Requirements – Refers to the â€Å"what† the product has to do, not the â€Å"how† it is be done. | |SC – Abbreviation of the name of the school where the system will be proposed, the Samar College | |SRS – Software Requirements Specifications.A document that completely describes all of the functions of a proposed system and the | |constraints under which it must operate. For example, this document. | |Stakeholder – Any person with an interest to the project but is not a developer. | |User – Any person who operates or interacts directly with the product. | |VB – Visual Basic, a building/programming software used in creating the system | |XAMPP – An applic ation used to have a connection between the product and its database. Appendix B – Group Log Notes Taken during our first meeting with Jun, Arnel & Marlon on January 23, 2013. †¢ Interview the librarian †¢ interview the library employees †¢ understand the flow of data in the library †¢ understand the processes used in transactions in the library †¢ new design †¢ lan network †¢ create a floor plan including 3 units for 3 stations of the whole system †¢ 3 stations: Admin station, Clerk Station, Log in Station †¢ provides photocopies of authentic documents from the library †¢ learn the penalty system of the library copy the list of books †¢ list the basic requirements †¢ Software Requirements Specification for Page 12 †¢ fix the QR scanner †¢ dry run the system †¢ Should we try this for different operating system environment? †¢ We might need licenses, ask if necessary. †¢ Given our budgets, th is is the best we can do. †¢ Set up servers. †¢ Began looking through test cases †¢ Will work on SRS †¢ Jun Abanag †¢ Created QR code samples for ID †¢ Will work on SRS. †¢ Marlon Alegro. †¢ Will work on SRS. †¢ Jun Abanag. †¢ Will work on SRS. †¢ Scrum Meeting 2/8/2013 †¢ Marlon Alegro Downloaded licensed software. †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Nicholas Cross †¢ Worked on SRS. †¢ Will work on feedback to finalize SRS. †¢ Jun Abanag & Marlon Alegro †¢ Worked on SRS. †¢ Will wait on feedback from mentor to finalize SRS. Group activities †¢ Overnight sessions (starts at 10 in the evening up to 5 in the morning: 7 hours) Most of us have part time jobs during day time and we have different schedules for Software Engineering so we used our time to work during evening and midnight because of the busy schedule during day time.We spend seven hours during midnight to work on our system and the SRS. ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 †¢ Group meetings Since we have different schedules for Software Engineering, we try to meet up during free hours. And most of the times we are not complete because of the busy schedule. So what we do is two of our group mates meet up at certain time and the other one would discuss it to the other member when they meet.So in that way we can exchange ideas even though we don’t meet properly. Afterwards, the other few members will also catch up with updates from the recent group discussion. ? Samar College, twice a week. Every Monday, Wednesday and Friday ? Alegro Residence one a week ? Abagua Residence one a week 11/15/2012 11/18/2012 11/19/2012 11/23/2012 12/4/2012 12/12/2012 12/15/2012 Index |A |Log out (use case), | |A –Flex ALMS, 5, 7, 8 | Clerk, 19 | |Add book (use case), 22 | Lib rarian, 16 | |Assumptions and Dependencies, 9 | | | |O | |B |Operating environment, 9 | |book, (use case) |Overall Description, 7 | | Borrow, 24 |Overview, Product, 6 | | Issue, 21, 1 7 | | | Search, 16, 20 |P | | Return, 21, 25 |Performance Requirements, 27 | |Borrower, 5, 7,8 |Product | | | Functionality, 8 | |C | Perspective, 7 | |Clerk, 5, 8 | | | use cases, 19 |Q | | station, 14 | QR (Quick Response), 5, 13 | |Context Diagram, 7 | | |Communication Interface, 15 |R | |References, 6 | |D |Reliability, 28 | |Delete (use case), 7 |Requirements | |Document purpose, 5 | External Interface, 11 | | | Functional, 15 | |E | Other Non-Requirements,27 | |External interface, 11 | Performance, 27 | | | Safety and Security, 27 | |F | Specific, 11 | |Functional Requirements, 15 |Return book (use case), 21, 25 | |Functionality, 8, 28 | | | |S | |I |Safety and Security Requirements, 27 | |Interfaces |SC, 6 | | Communication, 15 |Search book (use case), | | Hardware, 14 | Clerk, 20 | | Software, 14 | Librarian, 16 | | User, 14 |Software Interface, 14 |Issue, 17, 21 |Software Quality Attributes, 28 | | |Specific Requirement, 11 | |L |SRS, 6 | |Log in (use case) |Stakeholders, 6 | | Borrower, 24 |Supportability, 28 | | Clerk, 19 | | | Librarian, 15 | | | | | U | | |Use cases | | | Borrower, 24, 25 | | | Clerk, 19, 20, 21,22, 23 | | | Librarian, 15, 16, 17, 18 | | |User, 5, 6, 8 | | | characteristic, 8 | | | documents, 10 | | | interfaces, 9 | | | | |X | | |XAMPP, 6, 9, 14 | | ———————– Borrow books Librarian Clerk Search User System Database Librarian Update database Log in Article Borrower Issue book DATABASE Issue books Add Article Report Delete Article Update Librarian < include > < include > < include > < include > < include > Librarian Search book Log out Return books Log out Librarian Log in Librarian Log in

Friday, August 30, 2019

Development of Sexual Identity

Ethical relativism means, that I reject the Idea that there Is a single correct moral view. I think this because I believe that everyone has a right to choose and have their own moral view. I also think that in my own opinion that everyone that wants to do or say or feel a certain way should be able to and that no matter how much people say it may be wrong they should be able to show how we feel. I have also thought about critical thinking a lot different when it comes to sexuality. I think that we as younger adults, considering I am only 28, need to stop and think about the decisions that we eke as we are growing up.Now a days kids are getting younger and younger when they are having their babies, but the problem is that they are still babies themselves. They are ruing their lives and in some cases their baby's lives as well. Society needs to stop with all the media and showing the good things with babies and show the more negative things. With me though if I would have known what I know now I do not think that I would have had a child at 20, but no matter what I would not change it for anything and I know it is hard but in my opinion it was and is worth it. ;Describe the effect of environment and historical perspectives on your sexuality. In the environment that I was raised, I was raised to be tough and to be a manly man. My father really did not like gay, lesbian, or bi-sexual people and even treated them like they were nothing. I understand that if I was gay I would have been â€Å"disc- owned† and probably thrown out of the family, I did though have a lesbian cousin and I think that it must be the way my dad and his family were raised because her dad was very, very rude and really disheartening towards her.Being that my dad Is Native American and his family Is very proud I think that Just being raised around this type of family and their values can really affect you as a person. I think that the historical perspectives have really had no Influence on me personally because I think that we should learn from the past and historical events but we can choose whether or not to actually use them In our lives or make our lives ;our lives† that we live. ; Discuss the development of your gender Identity.A few things that have helped me In determining my gender Identity are that I have always felt that I need to take care of my family and to do my best when I am trying, his is one of the reasons that I chose to go back to school and further my education Ana try to get a netter JODI winner I can earn more money Ana Tell netter Dialectally secure about our future. I always feel that growing up my dad did a lot of working and really never spent time with us kids and I was always told that it was because he needed to take care of us kids and the family.And if I have gotten anything from him it was that taking care of your family was the first and most important thing to do. Another is that I am a sports fanatic and love the competitio n that comes with it. While watching TV. Hen I was younger I really never got what was happening but I knew that my dad did it so I thought it was the right thing to do. And when our team lost he was disappointed and really showed, so I thought that was normal activity, but I know now that it is Just a game and am now teaching my son that it is k to loose but having fun is the main goal.And lastly, and one of the most important things that I would say helped me with my gender identity was that growing up boys were the ;tough† ones and the girls were the ;weak' ones of course now that I am older I know that this untrue and that some girls are in fact stronger than some guys. Even though now that I think about it I and how wrong I really was I Just laugh about it because we were kids and it was only the perception of other kids that influenced me. ; Analyze the effect of attraction and love in your relationships.I think that the effect that attraction has had on me in my relatio nships has a lot of who I dated when I was younger. I used to see a girl that I felt was attractive and try to ask her out on a date. Then as I got older I used to see a girl that was attractive to me and I would try to take her out and start a relationship with her based solely on the first initial attraction. I understand that a real and stable relationship takes a whole lot more than Just looks to be a successful relationship and to be serious.I now am married to the most wonderful women on this planet and really and truly understand love. She is my best friend, my lover, and my world. We have nothing in common but that is what makes it so much fun, every day we either try something different or Just hang out together. Being different I think is Just like people say ;opposites attract† well in our case it has and I believe that life could not get any better. To me love really means something a to deeper than to other people.To me it means to love unconditionally and no matt er what you do not give up on that person Just because you or they are mad. So when I say ;l love you† I really mean it with all my heart and it is not Just a turn of phrase to me, like some of these kids that Just through it out there to Just say it. ; Discuss another topic of this course that is interesting and useful to you. Relate this topic to your life. I think that after taking this course another topic that has interested me and really related to my life is that of child and sexual molesters.The reason that this topic has really interested me is because I personally think that these men and women are very mentally and physically sick people. I think that these people should be giving help but only if they admit that they have done wrong and need the help. Now some people that think that this may be something they need to say to get out of Jail or whatever else that they are being held in, but they are only saying this to get out and are more than likely going to refine d and hurt someone else's child or them personally by raping them.I think that we as a society need to make a law that is a en strike for these offenders and be put away for life. I have a child and I know that being a father and if one was to hurt or molest my son I would be engulfed with rage Tanat may not De addle to nylon Deck IT I met ten person won a a It. So In my pollen I think that this would not only be looking out for the children but for the person who did this and to the parents or loved ones that the sex offender has done this to.Many people think that there should be either stricter rules for sex offenders and some think that the laws are fine as long as they register as a sex offender, but I think that story has shown that many of them go out and refined and hurt another child or person. So instead of stopping this while we could at the first time that they did it we let them out and they go out and destroy another life. I think that this is Just too risky and should leave them in the prisons to live their life out.An idea that I would suggest is that maybe build a facility on an island to serve as a place to put offenders and let them live a normal life but far, far away from people they may hurt and the children they may hurt. Now that I am done with this class I will still be doing my own research on a lot of he things that we have learned here and I hope to be able to pass them on not only to my kids but to anyone that may want to learn about this as well.This class has not only taught me a lot but it has opened my eyes to things that I may have never known or even thought about learning. I thank you and I hope that one day I may be able to share this with people to ensure that we understand our bodies and how they work, and what to do when things happen to us. Format your personal response consistent with PAP guidelines. Post your personal response as an attachment.

Thursday, August 29, 2019

Business Plan for Educational Website

Business Plan for Educational Website 1.0 Executive Summary Stay Clean, is a site that is based on Environmental Management Practices Education. It is owned and operated by me, Morrison Edwards. I am determined to ensuring that people live in an environment free of contaminations and appealing to live in. I am thus taking the initiative to educate people on how we can make our environment friendlier for habitation. The people are taught to carry out environmental practices once in a month. The activities involved in the practices are quite simple and are meant to encourage people on how the little changes they make in the initiative can make an enormous difference to the environment and their personal lives. The sources of revenue supporting the plan are from my personal savings from employment. I will be organizing with other affiliate companies and retailers to provide me with the products I will require in the process. Our benefits will be commission based from the sales of the products used in the environmental management practice. Financially the strategy is aimed at making profits, and of most concern will be minimizing expenses. A portion of the profits will be ploughed back into the business while the rest will be used for personal growth. I believe that it is a just course to keep our environment clean as much as the initiative is also a money creating opportunity. The cash flow into the action is a priority as well as the cash balance. In accomplishing my goals, the following areas are going to be of emphasis. The web content must be of the best quality and interactive to the users. The tips will be elaborate and engaging, inspiring and empowering so that the users will share the tips quickly enough to improve the use of the website. The project is aimed for gross profits in the future and so I will cut the current expenses to meet my current demands. The products that will be required in the process of the affiliate companies will have to be recommended on the website for buying by the people so that the profits gained from the commission will be used in the initiative. Since I do not intend to use more money in the expenses the online marketing plan will have to be perfectly effected to meet the expectations. 1.1 Mission The website is an educational platform meant to teach people on how to maintain the environment clean by performing cleanliness practices at least twice in one month. For the entire year. I am looking forward to enlightening people so that they become more environmentally conscious. In the process the affiliate institutions and retailers will have the opportunity to sell their products. The profits will be shared among all the member parties, the producing companies, the retailers and me. 1.2 Objectives of the Plan i) To conducting weekly environmental teaching sessions. Educate people on how their contribution in maintaining the environment will reduce environmental hazards or detrimental environmental impacts on the general popu lation. ii) At the end of the first year the website should have approximately 500 subscribers already signed up for the weekly tips on the environment. iii) The site must receive 10,000 customers monthly. iv) Profits will be evaluated within six months. v) The Profit will be redistributed to support the project and into personal savings. 1.3 Important Factors of success i) The Website content will have to be quality; the weekly tips will be elaborate and straightforward, friendly and inspiring. ii) The marketing of the site must be exquisite for maximum subscription iii) The expenses will remain flat to maximize profitability. iv) The products sold will be environmentally friendly and the buyers will have to be inspired so that the commissions care increased to make profits. 1.4 Summary of the Business The Stay Clean initiative is a small business website based in Marina and it is purposefully meant to enlighten the community on the effectiveness of cleanlines s to minimise the impacts of environmental hazards. The cleanliness initiatives training will be conducted twice a month as explained on the website. The teaching sessions are conducted online on the website or on weekly meetings for an individual attendance. The weekly audience subscription is free. The business will be making profits from commission received by the sale of products obtained from the Affiliate Company and retailers supplying the products to be used in the initiative. 1.5 Financial Plan I am looking forward to starting the initiative with a capital of 3000 dollars obtained from my personal savings. This will be used to come up with the website and in facilitating services of the Affiliate Company and retailers. The money will also be spent on the legal purposes and acquiring the computer equipment and in registering the computer domain for the name of the website. The remaining expenses will remain untouched until income generation begins. 1.6 Ownership of the Business Initiative The Stay Clean Business initiative is a sole proprietorship, a plan created and founded by (name). It is an enlightenment effort as well for personal growth The Products involved The business does not produce the required products on its own. I am marketing earthly friendly products recommended for cleaning and maintaining the environment. The products will be acquired from a company and retailers who will be paying the commission based on the sales of the products made. The company and the retailers are the affiliate parties. The goods thus will not be costly thus the cost of production is cut. The fulfillment and the inventory levels or the customer service. The only risk involved in the business is that the profit is commission based and only received in terms of percentage of the sales obtained from mobilization through the website organised weekly teaching sessions, and not from the entire sales. The recommended environmentally friendly products are: i) Products that can be reused. These are products that can be put back into use like lunch bags, batteries etc. ii) Supporting consumption of organic foods: vegetables, fruits, and snack meals. iii) Paper products that can be recycled. iv) Cloth diapers. v) Kitchen products: Cloth rags, towels etc. vi) Herbal medicines. vii) Low water usage: Shower heads, horse pipes and equipment that reduce water use. viii) Books on environmental friendliness. xi) Solar powered appliances and the tools and equipment running on solar. x) Music about environmental maintenance and friendliness. Market analysis Out target market is the general community especially the internauts or the technology survey who can access the internet in the age bracket of 18-55 years. This is the target group that can be used to make the environment better. The secondary market target are the students of age 12-22 who can have adequate time engaging in the environmental management practices. The retired people are also focused as they have more free time to attend the training sessions. 4.2 Target market Segment Strategy Since our primary aim is to live in an environmentally friendly atmosphere while also making profits, we have particular reason for the targeted market 1. The students – We engage them as they are technology survey and will pass the information faster to their associates, again they will embrace the initiative as they like clean surroundings 2. Adults – It is the largest market and the biggest target. They are the individuals who will be purchasing the products thus significant in revenue generation. 3. The retirees. They have more free time and resources to spend on initiatives that are environmentally friendly. 4.3 Industry Analysis The website is meant for educational reasons and since the educational sites are hardly available the completion is slim. The existing environmental sites deal with either giving news on the envir onment or other environmental topics not related to the latter. The website is an environmental friendly pro initiatives marketing products aimed at improving the environment from which the sales will receive the profits that is commission based. 4.4 Buying patterns Our focus is on enlightening people on the products they knew never existed and going by the friendliness in the adverts and inspiration, the customers will definitely chose us over other competitors as the information provided is simple and comprehensive but not overwhelming. Those who shall have adopted the information will just be buying the products and mostly will be introducing more people thus an increase in the product sales increasing out profits. The product finding process will be simplified so that they can easily be found in the Affiliate Company and retailers. (Software, 2017). References Bryman, A., & Bell, E. (2015). Business research methods. Oxford University Press, USA. Finch, B. (2016). How to write a business plan. Kogan Page Publishers. Hollensen, S. (2015). Marketing Management: A Relationship Approach. Pearson Education. Huynh, M., Appell, R., & Stetkiewicz, M. (2014). Process mapping. Software, P. A. (n.d.). Educational Website Business Plan. Retrieved February 21, 2017, from http://www.bplans.com/educational_website_business_plan/financial_plan_fc.php

Wednesday, August 28, 2019

Pre-Islam, Bedouin customs and religious beliefs Essay

Pre-Islam, Bedouin customs and religious beliefs - Essay Example For example, there are three major features of Bedouin religion which are quite absent from the Muslim beliefs. In fact, these practices are actually abhorred in Islam with punishments for disobedience of the same. Idol worship, polytheism and accepting that god has children are three things expressly forbidden by Islam while these things were expressly accepted by the Bedouin tribes. Additionally things which were part of the Bedouin religion of the time included the worship of stars, the worship of ancestors and other influences from Christianity as well as the Judaic religion (Henninger, 1981). In fact, the connection between Christianity, Judaism and Islam seems to be far greater than any connection between pre-Islamic Bedouin religions. For example, Mohammad accepted Christ as his brother but does not accept that Christ was divine. He also accepts the prophets of the Jews as rightly guided individuals and even follows the customs of the Jews until Islam is able to define customs for itself as a new religion. Moreover, the idea of animal sacrifice to appease or win favor with God comes from Judeo-Christian traditions and the idea of animal sacrifice is accepted by Islam as well (Henninger, 1981). While Mohammad was able to find some allies in the shape of Christians who were his friends and relatives, we know for a fact that Mohammad and his followers were all persecuted for their religion by the pagans (Hines, 1999). The Muslims must have said harsh words against the pagan religions of the tribes in Mecca which led to the negative reaction. Had there been no discrepancy between the two ideas for religion it is doubtful that Muhammad would have to go into exile from Mecca to save his life. One important connection between the pre-Islamic religion of the Bedouin and the religion of the Muslims is that the concept of the supreme god remains pretty much the same (Wikipedia, 2006). However,

Tuesday, August 27, 2019

Promotion & Price Research Paper Example | Topics and Well Written Essays - 500 words

Promotion & Price - Research Paper Example hannels can also be segmented in order to reach a wide range of people given that the business particularly offers services which can appeal to different people. Price discounts to regular customers will be used in order to create loyalty among them. Price discounts can also be offered during off peak seasons in order to appeal to the interests of the customers. The effectiveness of advertising and promotion will be measured through observing the performance of the organisation. An increase in sales means that the strategy is effective. Feedback from the customers can also be used to measure the effectiveness of the strategy used. The nature of the event will be used to determine the price and aspects such as duration of the event as well as the size of the delegation participating in that particular event will be used to determine the price. For instance, for every delegation, $300 is charged for day services and this will include itinerary such as food as well as other related refreshment. An additional $50 will be charged to cover overnight expenses. A 15 % profit margin will be used to calculate profit from the revenue generated. Our initial start up capital is $40Â  000 and we expect it to double in six months time. Our profit in six months time will be: Solomon M, Cornell LC, Nizan L, (2009). Launch! Advertising and Promotion in Real Time published online by flatworldknowledge.com. Accessed on August 8, 2011 at

Monday, August 26, 2019

Survey of Modern Art Research Paper Example | Topics and Well Written Essays - 1000 words

Survey of Modern Art - Research Paper Example The essay "Herbert Boeckl - Survey of Modern Art" discovers Herbert Boeckl and his art. During World War I, he began art as an autodidact while still participating in the army, which saw his career spanning to the time of reconstruction after 1945. In this period, he portrayed feminism through the way he depicted the suffering of women and children as casualties of war. He later studied in Berlin (1921-2) and Paris (1923), where he realized the classicism of Cubism which strongly distinguished his artistic strategy from both the graphic logic and consistency of Art Nouveau. On many occasions, he made trips to Paris where the art of modernity opened itself to Boeckl. He as a result of this became the chief delegate of meaningful, contemporary painting in Austria, specializing mainly with figural subjects and paintings. Following the study trip, the root for an innovative tectonic method to symbolic painting was acquired. He modified the typical classical trend with a hot impasto appro ach which comprehended the human body as a shipper of significance in terms of occurring issues, as is shown by the art in the analysis chain. In 1927, Boeckl took part in the exhibition in the Vienna Succession and achieved his first significant successes. He became a significant teacher for many prominent Austrian painters and a professor at the Academy, running the evening life-drawing classes, before becoming principal in 1945/1946 and again from 1962 to 1965. Boeckl came back to painting in 1945. ... As a result of his experience and interaction with the frescoes, he came up with a sequence of sacred frescoes in European Modern Art. This influenced him as thus the painting of the Angel Chapel of the Seckau Abbey in Styria between 1952 and 1960. Herbert Boeckl died in the mid sixties in Vienna. While still at school, Boeckl took his first steps in his artistic career, making copies of nineteenth-century landscape paintings in Klagenfurt Provincial Museum. His landscape paintings were symbolist in mood and secessionist. While serving in the army, his pictures began to show an expressive intensification, that he showcased in the exhibitions of the War Reporting agency. His portrait of Grimschitz was first exhibited at the Carinthian sculpture Association, which as well showcased the works of Egon Schiele (Batliner, 1). His work covers most if not all genres of painting such as religious paintings, portraits, nude, mythological histories, still life and landscape. He mostly used oil canvas in his artistic work. The work of Boeckl can be categorized into three distinct stages that are objectivity phase, the expressionistic illustrations and the concept of realism. Boeckl paintings and sculptures also display feminism through the gracefulness and propinquity in which he expresses the physical existence of the female body. The expressionistic pictures were Boeckl’s first works and conveyed highly expressive style of painting with thick colour. It also included impasto paint appliances. The expression period was 1918-1920 which marked the beginning of his skilled life. He adopted pastose brushstrokes to make his work wealthier in detail, thus

Sunday, August 25, 2019

Performance Appraisal Essay Example | Topics and Well Written Essays - 750 words - 1

Performance Appraisal - Essay Example The performance appraisals are used to give feedback to the employee on the performance rating and the need for improvements. This also expresses the need for trainings, promotion, demotion, retention or firing. The performance appraisal is among the critical factors of a manger or a leader to provide employee with the feedback and clarify the job expectations. An effective performance appraisal enables employees to know about themselves and understand the management values. The performance appraisals make use of evaluations as feedback in order to improve the performance of employee and reduce the turnover. It increases motivation and instills a feeling of equity among the employees. The appraisals act as a linkage between the rewards and performance. This enhances performance as employees are told about their performance and related strengths and weaknesses. This makes the employees become proud of whatever they are doing well and enables them focus their efforts on areas that require improvement. In overall, organization will benefit when the performance of the employees improves. Every organization is interested in witnessing their employees advance in the company and get other better and well paying positions. This is normally brought about by performance appraisal. For instance, when an employee is told to improve personal skills to be eligible for the following promotion may act as a driving force to that employee to enable them improve their per formance (Goswami, 2013). The performance appraisals are used by the management in making important decisions by the management. These decisions include promotions, demotions, firing and remunerations among many others. Efficient organizations must have established means through which they can make their decisions. The decisions depend on appraisal data. The appraisals can be considered as efficient tools in documenting the organizational decisions. This

Global virtual sales team Research Paper Example | Topics and Well Written Essays - 750 words

Global virtual sales team - Research Paper Example They are functioning to better comprehend the competencies that defines their global leadership strengths. Another challenge lies in the numerous strategies they are implementing. They are unsure which strategy would lead to successful outcomes in attempts to form global teams. Thus, it is a trial and error practice (Virtual teams, 2). The final challenge revolves around the issue of getting those in remote areas engaged. Most remote areas cannot enable the installation of technologies that global team’s use. Hence, people in the grassroots are constantly being left behind regarding virtual team recruitment and training. Accurate information from the rural areas has been rendered useless because it cannot be presented to the top management. The ultimate result is that investors besides some stakeholders cannot access the information. Recruitment and training of virtual teams can be done using online advertisement. One can be recruited when he or she clicks on the website. Ther eafter; they are trained on how to use virtual tools like teleconferencing or video tapes. With each member of the virtual team being in a position to use virtual tools, they can easily be managed by logging in and participation during virtual meetings. Enhancement in information technology eases data to easily avail in virtual teams. This step made it easy to train and educates virtual teams. For example, software for analytical presentation has made it easy for data to be easily availed (Sarah, 1). The software allows data to be presented instantly by using either the web or an intranet. This software also allows complex analyses to be calculated. This software is very useful during recruitment and training of people within the virtual team. Sales in virtual teams are achieved by the use of telemarketing. With a sales team that is effective, evaluating sales is made much easy. This is because the teams have experience on how to manage data related to sales despite their geographic al location. This is done with constant links with the top managers. When to hold virtual meetings among virtual team is an open issue. This is because it depends on the team characteristics. This includes the nature of sales and so on. Virtual meetings can be held at least once a month. However, if there is an urgent issue that needs to be addressed; the frequency increases... This is because there are a lot of uncertainties in the business environment which should be addressed as they arise (Marian, 2). Teleconferencing is one way in which virtual meetings can be held. Teleconferencing offers many advantages. One of them is that people participate regardless where one is. This means that travel expenses are not incurred. With efficient planning, virtual meetings have turned to be successful. The use of video feeds to conduct virtual meetings is also useful. All these methods of virtual meetings need a proper plan to ensure that all succeeds. The same skills that are used in non vi rtual meetings are applicable in virtual meetings. This also demonstrates that conducting virtual meetings is such a simple task. The first and most important step when leading a virtual team is to adequately equip them with the desired tools and skills. Thereafter, building interaction among the team members would be necessary. The rights skills are useful in creating balance between the social skills and technology interface... As a

Saturday, August 24, 2019

David Suzuki Foundation Assignment Example | Topics and Well Written Essays - 1000 words

David Suzuki Foundation - Assignment Example y, protection of the climate, habitat and endangered species protection, future projects on energy and sustainability of healthy oceans and seafood among others. The David Suzuki Foundation is very strict when it comes to uploading ethics. Some of the ways it does this is by not accepting funding or donations from individuals or organizations that have a hidden agenda in mind. They care about their integrity and reputation so much so that it declines such gifts or funding despite their value. This is the reason it does not accept direct funding from the government as this will mean they are indebted or at the mercy of the government and hence will lose its ethical conduct. The only funding from the government it takes is that provided through the National Sciences and Engineering Research Council of Canada. On environmental values, the foundation strives to uphold the human rights of people when still safeguarding the environment. They are guided by the United Nations Declarations on Rights of Indigenous People formulated in 2010 and which protects the indigenous people who rely on the environment for their survival. In their aim to protect the environment therefore, they avoid clashing with the Aboriginals and they always respect them. They even at times use them to safeguard their other environmental policies as these people have indigenous knowledge of the environment and have vested interests in the environment being safeguarded. Its environmental values are also upheld through having their offices heated and cooled by geothermal system, recycling of its products, planting native species in the roof, having automatic timers to shut off their electrical appliances to save energy, employees commuting to work through biking or walking and using teleconferencing to reduce air travel. Their suppliers are also green suppliers using organic and non-toxic biodegradable among others all aimed at protecting the environment. Its code of conduct demands that its

Friday, August 23, 2019

Transactional Leadership Principle Essay Example | Topics and Well Written Essays - 500 words

Transactional Leadership Principle - Essay Example s and Emma Walton Hamilton, David Baldacci, Sandra Brown, Stephen Colbert, Chris Colfer, Michael Connelly, Jeffery Deaver, Nelson DeMille, Tina Fey, Malcolm Gladwell, Chelsea Handler, Harper Lee, John Maxwell, Brad Meltzer, Joyce Meyer, Stephenie Meyer, J.R. Moehringer, Joel Osteen, James Patterson, Randy Pausch, Jerry Pinkney, Keith Richards, JK Rowling, J.D. Salinger, David Sedaris, Lemony Snicket/Daniel Handler, Nicholas Sparks, Jon Stewart, Scott Turow, David Foster Wallace, Brent Weeks, and Tom Wolfe. D. Forrester Research Inc. contrasted that, on the one hand, physical book sales in the U.S. are expected to decline to $19.5 billion this year from $26 billion in 2010, while, on the other hand, e-book sales are anticipated to multiply eight times to $8.7 billion (Lee, Satariano, & Hymowitz, 2014). B. Hachette negotiates tangible, extrinsic exchanges by resisting the increase in power of Amazon in controlling e-book prices because it wants to ensure that it is the one profiting more and the one in power over strategic pricing. Gillette, F. (2014, June 6). Layoffs make Hachette easier prey for Amazon. Businessweek.com. BloombergBusinesweek. Retrieved from http://www.businessweek.com/articles/2014-06-06/layoffs-make-hachette-easier-prey-for-amazon Lee, E., Satariano, A., & Hymowitz, C. (2014, June 6). Amazon feud with publishers to escalate as contracts end. BloombergBusinesweek. Retrieved from

Thursday, August 22, 2019

Kant Moral Law Theory Essay Example for Free

Kant Moral Law Theory Essay â€Å"Two things fill the mind with ever new and increasing admiration and awe the oftener and more steadily we reflect on them: the starry heavens above me and the moral law within me.† – Kant (1788), pp, 193, 259 Immanuel Kant introduced and initiated his ‘moral law theory’ in the late 18th century. The doctrine in question sought to establish and constitute a supreme or absolute principle of morality. Kant disputes the existence of an ‘ethical system’, whereby moral obligations are obligations of ‘purpose’ or ‘reason’. The accuracy of actions [i.e. the rightness or wrongness of an individual deed] is determined by its configuration and conformity with regard to ‘moral law’. Evidently, according to Kant, an immoral transaction is invariably contemplated as an illogical or unreasonable occurrence or action. The supreme moral principle is a consistent working criterion that proves to be practically helpful and theoretically enlightening when used by rational agents as a guide for making personal choices (Kant VI). A supreme guiding moral principle must carry with it an absolute necessity and be done out of duty to the moral law in order to be free from corruption. Kant believed in a fair and impartial law. He accredited and affirmed the presence of an objective moral law that we, as humans, were/are able to identify with through the process of reasoning. Kant argued that we are able to recognise and distinguish moral law, without making reference to the possible consequence or outcome. Immanuel Kant declared a differentiation between statements [i.e. posteriori and priori] that he believed to coincide with moral law. A posteriori statement is one that is based on experience of the material world. In opposition, a priori statement requires no such knowledge; it is known independent of the phenomenal world. Furthermore, Kant continued to make additional distinctions with regard to analytic and synthetic statements. An analytic statement, he claims, is one that by its very nature is necessarily true, as the predicate is included within the definition of the subject. Example: – [â€Å"all squares have four sides†]. The previous statement is of an analytic nature, as the predicate, i.e. the square having four sides, is implicit and is part of the definition of the subject – [â€Å"square†]. An analytic statement is necessarily true – true by its own authority, and is purely explicative, as it tells us nothing new about the subject. In contrast, a synthetic statement is one in which the predicate is not included in the definition of the subject, and thus is not necessarily true. A synthetic statement also tells us something new about the subject. Prior to Kant, it was widely accepted that there were only two types of statement: a priori analytic and a posteriori synthetic. Kant accepted these two statements although believed there to be a third: a priori synthetic statement. These are statements that are known independent of experience that may or may not be true. Kant claimed that these priori synthetic principles are inherent within us and therefore subsequently form the basis of all moral decision making. Kant’s theory is based on and is primarily concerned with the aspect of ‘duty’. Kant believed and promoted the notion that to act morally is one’s ‘duty’, and one’s ‘duty’ is to act and proceed in accordance to the principles of moral law. Due to this, Kant’s theory is categorised and distinguished as a ‘deontological argument’. A deontological theory is one that maintains the moral rightness or wrongness of an action and depends on its fundamental qualities, and is independent of the nature of its consequence – â€Å"Duty for duty’s sake†. This perspective can be viewed in contrast to the beliefs and ‘rules’ associated and belonging to teleological arguments, i.e. utilitarianism. Immanuel Kant argued that moral requirements are based on a standard of rationality he dubbed the â€Å"Categorical Imperative. The categorical imperative has derived from the initial belief and notion that humans base their moral judgment on pure reason alone. This view can be viewed in contrast to a ‘morality theory’, which assumed/s that human’s actions are guided by emotions or desires. Example: When deciding what I ought to say to a friend who is distraught. Rationale would dictate that I give sensible advice, whereas my emotions may impulsively tell me to give comfort and sympathy. The categorical imperative declares and differentiates between obligatory and forbidden actions, and places further emphasis on the notion of ‘duty’. This statement can be strengthened through the following quotation – [â€Å"All in imperatives command either hypothetically or categorically†¦ If the action would be good simply as a means to something else, then the imperative is hypothetical; but if the action is represented as a good in itself†¦ then the imperative is categorical.†]. Example: If someone tells me that they will buy me dinner if I give them a lift into town, then this is a conditional action and would fall into the hypothetical imperative category. Conversely, if I think that I should give my friend a lift into town with no other agenda (i.e. she will not buy me dinner because of it), then this is a categorical imperative because it is independent of my interest and could apply to other people as well as myself. There are three principles of the categorical imperative: * Universal law; * Treat humans as ends in themselves; * Act as if you live in a kingdom of ends. 1. The categorical imperative is [â€Å"Do not act on any principle that cannot be universalised†]. In other words, moral laws must be applied in all situations and all rational beings universally, without exception. 2. [â€Å"Act that you treat humanity, both in your own person and in the person of every other human being, never merely as a means, but always at the time as an end.†] – The previous statement declares that we must never treat people as means to an end. You can never use human beings for another purpose, to exploit or enslave them. Humans are rational and the highest point of creation, and so demand unique treatment. 3. The quotation [â€Å"So act as if you were through your maxim a law-making member of a Kingdom of ends†] states Kant’s belief in the fact that humans should behave as though every other individual was an ‘end’. In conclusion, it is arguable that the categorical imperative possesses a sense of authority with regard to what actions are permitted and forbidden under Kant’s moral law theory.

Wednesday, August 21, 2019

Effective Teaching and Learning

Effective Teaching and Learning The purpose of Instructional design is to integrate resources to facilitate students acquisition of the learning goals as well as help teachers use what is available to help students achieve the desired learning outcome (Walter Dick, 2010). Nevertheless, instructional design should be grounded on theories of learning and instruction (Morrison, Ross Kemp, 2007). The following are several major teaching strategies and learning, instruction theories I have applied in my individual instructional plan. Also I will elaborate on the reasons for applying them in the following part. First, greet students before class. In my point of view, this is an effective way to build positive relationship between students and teacher .According to Boynton (2012), developing positive teacher-student relations are one of the most effective method teachers can take to establish a positive discipline climate in the classroom. Its not difficult for us to recognize that students who are treated with respect as well as love and care tend to behave well and have better academic performance. It is because we all want to be valued and respected and students without doubt also have these feelings, as a result, in order to get more attention and appreciation from the teacher, they will try to please teachers by behaving more appropriately to fit the teachers expectations. In this sense, we have to realize that rules alone cannot improve the behavior problems of students, whereas good teacher-students relationship can not only encourage students to behave well, but also benefit learning outcomes of students and help to ac hieve effective teaching. Second, improve the physical learning environment by arranging the desks in the U shape. With this arrangement, the teacher can see every student, and every student can see the board .This set-up puts the focus on the center of the room where the teacher will be teaching. Also, this set-up allows for ease of putting them into groups or partners. Besides, this arrangement maximizes the classrooms physical space and allows the teacher moving around the room a lot while teaching and keeping students attention. Despite facilitating easy teacher movement and proximity, it also improves student movement and communication. In short, the arrangement of the desks facilitates the teaching strategies employed and allows sufficient interaction between teacher and pupils, as well as among the pupils themselves Third, the lesson is presented in a way thats relevant to the students. In this instructional plan, the topic is about family and it is also further planned for students to show their own family photos, which are all closely related with the students. In this way, it gives the students a reason for learning, for they are relevant to their lives. Besides, it will stimulate the students interests and help to create a fun and productive learning environment. According to a neurologist and former classroom teacher Judy Willis, Long lists of vocabulary words that dont have personal relevance or dont resonate with a topic about which the student has been engaged are likely to be blocked by the brains affective (or emotional) filters, That is to say, students need a personal connection to the material, whether thats through engaging them emotionally or connecting the new information with previously acquired knowledge. In addition, making the information personally relevant can also improve the self-referent encoding of knowledge. Without this relevance, students may not only disengage and quickly forget, but they may also lose the motivation to try. (Bernard, 2010) Forth, use question strategies to facilitate students learning. According to Cotton (2006), questioning is second only to lecturing in popularity as a teaching method. So in this instructional plan, I use questions in order to: *quickly check for understanding by asking yes /no or true /false question and have students quickly stand up to show the answer they agree with. * gain attention, keep all students on task and reduce the likelihood of management problems *have students repeat directional procedures *elaborate on their answers /work * stimulate higher level thinking Apart from the aforementioned reasons, I also want to use questions to motivate students to learn. Because questions can offer a variety of opportunities to let students experience success, build up confidence, meet their intellectual and psychological needs and help to further develop their knowledge, skills and cognitive competence. Fifth, take advantage of cooperative learning of constructivist in teaching. I have applied two major methods of cooperative learning in this instructional design *Student Teams-Achievement Division *Jigsaw grouping By using the STAD, students will not only get enough time to rehearse new information, but also help each other to learn better through peer assistance in the small group . And in Jigsaw grouping, students are assigned to different roles in the group and only through sharing could they finish the task. Thus, the purpose of applying cooperative learning methods is not just for improving learning, but to cultivate a cooperative spirit, improve students presentation , social , communication skills and learn to be responsible as well. Sixth, provide various activities. In this instructional plan, I try to give students hands-on activities in order to achieve the following aims: * practice and rehearse what they have learned and give feedback to the teaching about their learning * get them away from passive learning through exploring and researching by themselves. *repeating information to keep it in STM, because information is lost rapidly without further processing. *give alternative opportunities for them to experience success and meet their psychological needs *create easy and interesting learning environment and have students actively and continuously engaged. Furthermore, it cant be denied that classrooms with motivated students, enthusiastic teachers, and stimulating, meaningful activities have fewer discipline problems, which is also crucial in helping to achieve effective learning. Seventh, use videos to supplement lessons. In recent years, the use of multimedia plays a more and more important role in teaching and learning because of the many advantages it has brought about. M. Hogreeve (1995) suggests several advantages with the use of multimedia for language learning, it includes a high level of stimulation of the senses a high level of involvement, attention, concentration -emotional arousal strong recognition effects So in the enrichment and remediation part of my instructional plan, I use a video of a family song in order to: *help to review and consolidate the knowledge learned *cater to different learning styles (visual, listening, touch) *vary material and mode of delivery to avoid satiation *get attention and improve memory by encoding information on the basis of dual code theory *motivate their interests in learning Eighth, apply scaffolding strategies in the teaching process. Scaffolding is the temporary assistance given by a teacher to help a learner learn how to do something, so that the learner will later be able to complete a similar task alone. As a result, I have added a scaffolding activity by modeling the family introduction first and then let the students do their own family introductions according to the words, sentences and ways the teacher has presented in her demonstration. Moreover, as can be seen in the first two parts of my instruction plan, I have used many questions to elicit new information of the lesson, which is another method of scaffolding through questioning techniques. Last but not least, provide positive and timely feedback to facilitate learning. Research on teaching effectiveness indicates that students need specific feedback to understand what is expected of them, correct errors, and get help in improving their performance (Sadker, D., Sadker, M. Zittleman, K.R., 2011). Therefore, I provide feedback to students and their performance throughout the instructional plan. There are many types of feedback, among which three types of feedback have been applied in this instruction plan. *nonverbal feedback *verbal feedback *motivational feedback (Barry, 2008) In the activity part , I ask the rest of the students to clap their hands to celebrate the students correct answering , which is a nonverbal feedback and acts as an encouragement and helps to build up the confidence of the students. I also use verbal feedback to try to provide the students with suggestion, clear direction for building on strengths or correcting errors when their answers are not on the right track. Motivational feedback is applied most frequently in this instruction plan, like awesome, yes, excellent, etc. They act as positive feedbacks that provide incentive for students to repeat actions that lead to good results. Hence, most of the time, feedback can be seen as a reinforcement, and plays a key part in reinforcing the good learning habits of students. In conclusion, the aforementioned strategies and theories are aimed at achieving effective teaching and learning, and at the same time, putting emphasis on the growth of students to enhance their social skills by being competent and responsible, developing in particular their self-motivation, self management and confidence in the process of learning. (Word counts: 1540)

Tuesday, August 20, 2019

Childrens Understanding of Food And Nutrition

Childrens Understanding of Food And Nutrition There has been much attention paid to the diet of children in the media of late as concerns about childhood obesity continue to grow as more incidences are reported; a search on the web reveals results of about 80,600 for childhood obesity news items (0.32 seconds) (web search conducted on 14th April 2010). As food intake has an obvious link to obesity the article investigating school childrens knowledge and awareness of food and nutrition may provide insights to this situation and perhaps offer suggestions to remedies that might improve childrens diets. The literature in this study is comprehensive citing work from the UK, USA, Australia and New Zealand. All of these countries are English speaking countries with a Western diet and lifestyle so any comparisons drawn from the study of Surrey schoolchildren could bear relevance on the issues discussed. Authors from Health Education Authorities and writers from nutritional education and medical backgrounds contribute work that dates from 1980 to 2001. As the article is dated 2002 some of the information may now be outdated regarding the guidelines provided by health authorities and the programmes of study contained in the Primary School curriculum in the UK at 2010 which has undergone changes and is now known as the National Strategy that incorporates food and nutrition education throughout the cross curricular themes and especially in the health education element of physical education. The literature covers a wide variety of topics pertaining to the investigation including quantitative information resulting from diet and nutrition surveys (Gregory et al, 2000), food guidelines (Department of Health,1998; FAO/WHO, 1998) and qualitative information from research conducted by various authors (Birch, 1980; Dobson et al., 1994; De Bourdeaudhuij, 1997). All literature was fully referenced to allow the reader to follow up points of interest or to verify facts and validate claims. The aims of the study were to elicit childrens understanding of: à ¢Ã¢â€š ¬Ã‚ ¢ aspects of parental control over food choices and food rules that interact with food provision; à ¢Ã¢â€š ¬Ã‚ ¢ how diet and diseases are connected, specifically dental health and obesity; and à ¢Ã¢â€š ¬Ã‚ ¢ the categorization of food into groups and the schemes children use to do this. The methods used for this investigation are clearly stated; they are based on the population coming from the percentage of Free School Meals (%age FSM) as an indicator of socio-economic status (SES) for 7-11 year olds in Guildford, Surrey. Following a grouping of the quartiles of %age FSM entitlement, a judgmental selection or systematic random sample was made from the top and bottom ends of the calculated figures. Children at either end of the age scale were chosen to provide a clear comparison between attitudes relevant to age and within the sample the sample framing was randomly achieved by selecting the identified category through single gender alphabetical listing from registration rolls. Thus seven girls and seven boys were selected from each participant school with reserves in case any child should drop out or be unavailable. Motivation and understanding form the two criteria being investigated regarding food choices by this pre-adolescent age group. Though the study is limited to a small number of participants, 390 in all, it is hoped that generalisations might be made regarding the greater population. Focus group discussions were used to obtain data with open-ended questions (as prompts) on four core topics providing the instrument to be used by the same moderator for each group. Audio recordings were made of the discussions for transcription and narrative analysis. The moderator also expanded, where necessary, with further verbal explanation to stimulate discussion. Although the sample was refined and the questions pre-set, the group discussion method may not offer valid results as the language skills of children may vary greatly and prompting may have contained leading questions that could skew results. The analysis involved putting emerging themes into categories from participant quotes by two separate investigators working blind on the data sources. As the information related to groups rather than individuals, the unit of a nalysis had to be the group and therefore possibly a dominant voice which is a weakness in this investigation. The researchers also state that descriptive summaries form the basis of the analysis and that, No formal statistical tests were applied to the data, which are qualitative in nature. The lack of formal statistical results is another weakness as a more structured questionnaire might have provided a means of analysis with testable results. Using something like a Likert scale to show greater or lesser agreement with statements might have allowed this particular survey/investigation to be used elsewhere with independent interviewers over a much larger sample, both in numbers and geographically. Perhaps also employing stratification in the sampling would reveal clearer perceptions and attitudes specific to age groups and gender to separate the SES variable in responses. This study aimed to gain an insight into the current awareness of nutritional issues amongst primary school children and the language they use in association with these topics. This statement contained within the article does not uphold the original aims (mentioned earlier in paragraph 3) and so the integrity of this piece is compromised by the introduction of language as a contributory factor to the outcome. None of the quotes or analysis statements qualifies fat as being overweight/obese/health risk. The focus group methodology proved successful in achieving this objective with a number of key themes emerging from the discourse which will be used to feed into the development of food based dietary guidelines for children. As the objective failed to mention the influence of language in its parameters this statement also fails to uphold the original aims. Despite stating, By using qualitative methodology, it was anticipated that the full range of responses would be captured whilst avo iding pigeonholing this dynamic population with pre-existing beliefs. Analysis was designed to examine how these areas of enquiry varied with gender, age and SES, the arguments presented are based on a subjective analysis that assessed the quotes on implied testimony and what the authors thought the children meant in their responses. There are obviously difficulties and barriers to overcome when collecting qualitative data and considering the language element and the limitations on verbalisation particularly from younger children, the questions presented should perhaps have been more sympathetic to their cognitive ability and been supported by visual stimulus with foodstuffs and outcomes shown as picture alternatives that could be chosen to express the consequences of certain choices rather than relying on verbal language alone. Particularly as the research was addressing SES as a contributory factor to eating habits and knowledge and understanding of food the researchers failed to take into account the effect SES might have on the ability to express well any intended meaning which ultimately is open to interpretation by the investigators. Although food-health links were reported more frequently by low as compared with high SES groups, the former were less likely to be correct in the associations made (44 and 84% correct for low and high SES groups, respectively). Gender differences in the accuracy of food-health and food-nutrient links were also apparent (85% correct for girls and 65% correct for boys). The article does provide a foundation for further study but the methods used, especially the design of the instrument, need further refinement to eliminate other influences on the outcomes. As the article is presented by the Centre for Nutrition and Dietetics, School of Biomedical and Life Sciences, University of Surrey, Guildford, Surrey, UK it would be reasonable to expect greater consideration to be given to the educational inconsistencies and language skill and ability to effectively articulate particularly when the literature contains references to Piaget, the Department of Education and Employment, childrens interpretation of nutritional messages and Focus Groups: A Practical Guide for Applied Research. The authors do admit, Our sample was drawn from a narrow demographic population and so these results cannot be generalized to the British primary school population as a whole. And they further state, The focus group methodology itself has both advantages and disadvantages when a pplied to this age group. Although it did allow the children more freedom to express their opinions, highlighting language and trains of thought which would not have been covered by a more structured approach, a number of the children were reluctant to take up the opportunity to discuss topics, being content with short, succinct answers. In these cases, probing by the moderator inevitably results in more direct questioning and the potential for unintentionally leading questions. Similarly, the problem of children parroting learned responses or those, which they perceive to be correct regardless of personal beliefs, has been raised by other researchers (Lytle et al., 1997). The frequency of apparently accurate food classifications in the current study that were not substantiated by correct justifications would support this phenomenon. Rather than seeing differences in attitude in direct correlation to SES the research discovered that gender difference was the biggest factor in the st udy. The findings report, the need to develop cognitively appropriate age and gender specific food based dietary guidelines for children. Though this may be interesting it was not part of the initial objective or aim of the research and in writing this article there should have been a clearer definition of the expectations and how extraneous variables were to be controlled. The questions used did not address how much information the children had received from their studies in school but assumed that much of the information was gained from peers, TV advertising and parents. There should have been a comparison with the knowledge already delivered (if not learned) at the Key Stages from the curriculum with the information expressed from the children and a clear differentiation between where they gained their information from. Dental health came across as a knowledgeable area which is unsurprising as it is delivered as part of the curriculum from nursery age but elements of healthy livi ng like heart disease etc are not addressed until much later in the school programme of study.