Wednesday, December 25, 2019

Information About Seizure Of Computers - 2673 Words

Seizing Computer Evidence Introduction: Patrol officers are often called upon to seize a computer for analysis. It is essential that all patrol officers know how to properly seize a computer. Resources: The following online resources can be used to complete this research assignment: †¢ Focus URL: http://www.fft.uk.com/computer-forensics/forensic_check.asp This Web site provides tips for seizing a computer for forensic examination. †¢ New Jersey Computer Evidence Search and Seizure Manual URL: http://www.state.nj.us/lps/dcj/pdfs/cmpmanfi.pdf This Web site provides details regarding the search and seizure of computers. †¢ Best Practices for Seizing Electronic Evidence URL: http://www.forwardedge2.com/pdf/bestPractices.pdf This Web site provides†¦show more content†¦Explaining digital evidence and providing at least three examples of devices that can contain digital evidence. 2. I will address the issue of properly preserving digital evidence. 3. I will discuss how to properly preserve and document a computer crime scene prior to seizing the computer. 4. I will explain how to properly shut down the computer at the time of seizure. 5. I will address transport and evidence transmittal issues. To define what â€Å"digital† evidence is; first I will define what normal crime scene evidence is. Crime scene â€Å"evidence† is: â€Å"Any data, materials, objects, property, documents, or records that are given to a prosecutor/defense of a criminal case, which prosecutor/defense presents in court to be used as testimony against or for a defendant in open court.† (Knetzger, Michael and Muraski, Jeremy, 2008) (p. 278) Therefore, â€Å"digital† evidence is very similar and familiar to first responders because digital evidence is, evidence that is of an electronic nature, where its environment is in the â€Å"virtual reality† of computers and other electronic devices. Digital, electronic data, or information takes the form of â€Å"bits† and â€Å"bytes,† which are stored magnetically on a computer’s hard disk drive. Digital evidence can take many different forms; such as:

Monday, December 16, 2019

Comparing Mary Shelleyés Frankenstein with The Tale of...

When comparing Mary Shelley’s gothic novel, â€Å"Frankenstein† to the 2008 movie, â€Å"The Tale of Despereaux† a common theme that runs through the novel is the character archetype of innocence to evil. In â€Å"The Tale of Despereaux,† one of the major characters in the story is Chiaroscuro, or Roscuro. Roscuro is a rat who is misunderstood by people who have not yet met him. He travels with a human companion by boat and docks in the kingdom of Dor during the annual Royal Soup Day. Roscuro, enchanted by the soup’s aroma, travels up the chandelier in the royal dining hall and ends up falling into the Queen’s soup, giving her such a fright she has a heart attack and dies. Roscuro, feeling guilty over the death of the Queen, goes to see the Princess Pea†¦show more content†¦Even when the creature tries to help someone in need, he is still seen through the eyes of the world as a monster. Roscuro tries to apologize to Princess Pea but she immediately shrieks in fear and chases him away. This is the moment when Roscuro understands he cannot get anyone’s approval, no matter how genuine and kindhearted he tries to seem, and vows revenge on the princess. Both Roscuro and the creature are very lonely and wish to have someone who can understand the way the feel. The creature, at first, convinces Victor Frankenstein to make a female companion for him. And â€Å"even as (Roscuro) changed†¦he had longing. But now he just longed for someone whose heart was as hardened as his was.† (The Tale of Despereaux) Miggery Sow, the Princess Pea’s personal servant, was treated very poorly before she became the Princess’s servant. She wants nothing more than to be a Princess and live in a castle. Roscuro understands how Mig feels and convinces her to kidnap the Princess and lead her into the dungeon of her own castle. While there are some major similarities between â€Å"Frankenstein† and â€Å"The Tale of Despereaux,† there are quite a few differences within their context as well. In â€Å"The Tale of Despereaux,† a common theme that runs through the movie is forgiveness. The Princess Pea and Roscuro both forgive each other and, of course, everyone lived happily ever after, as all fairy tales do.

Sunday, December 8, 2019

Dissertation Proposal for Researchable Topic Area- myassignmenthelp

Question: Discuss about theDissertation Proposal for Researchable Topic Area. Answer: Title: Factors affecting job satisfaction in the aerospace industry Researchable Topic Area and Objectives The organizational behavior of the aerospace industry has encouraged the development of critical variables that have contributed either positively or negatively to the performance of employees within the industry (Moynihan Pandey, 2007). The human resources within the industry contribute successfully to the success of the industry since the commitment and satisfaction of employees determines their performance and that of the entire industry (Borzaga Tortia, 2007). It is therefore important to ensure that employees of the aerospace industry exhibit a high level of satisfaction from their job, so that they can carry out their work responsibilities diligently. The interactions of employees of the industry both at work and away from work, as well as the compensation offered by the industry to its employees are major contributors to the commitment and motivation of employees to the industry (Durst DeSantis, 2007). The research objectives of this research are: The factors that contribute to the motivation and commitment of employees to their jobs. The economic and environmental factors that contribute employee satisfaction within this industry. How the strategies and organizational behavior of the industry affect employee motivation and commitment of employees. Literature Review Literature reviews conducted on the impact of job satisfaction on the performance of an industry has shown it promotes the commitment and motivation of employees to perform their responsibilities diligently and thus contribute to a positive performance within the industry (Judge, Heller, Mount, 2012). The biggest contributors to job satisfaction within any industry are experiences that the employees have when executing their work roles and how different these experiences are from their expectations regarding that job and its responsibilities (Danish Usman, 2010). It is possible that the employees are satisfied with some aspects of the job and completely unmotivated and dissatisfied with other aspects. The concept of job satisfaction factors the emotional reaction of the employee to their job and is thus determined by how the expectations of the employees are met by that job (Hagedorn, 2007). Thus the environmental and economic factors contribute greatly to the emotional reaction of an employee to their job. The business strategies commonly applied in the industry also ought to encourage commitment, motivation and a positive attitude towards the job through opportunities, compensation, positive relations, and the experiences of the work roles. This research will utilize a cause-and effect model as the theoretical framework. Proposed Research Methods The research design utilized will be a descriptive design which will also incorporate a quantitative research of the dependent and independent variables. This will be achieved through collection of data through interviewing and questionnaires to conduct deductive reasoning on the findings of the data collections to determine the applicability of the concepts of the literature review. The questionnaire will entail 21 questions distributed to a sample of 100 employees in the industry for data analysis. The ethical standards of conducting a research will have to be observed through allowing the employees to sign informed consent forms. These informed consent forms will indicate acknowledgement of the participants of the research to keep all the collect data confidential and only used for the reasons explained in the study. Organizational consent forms are not required as the research cuts across the whole industry and a given organization (Gaertner, 2010). Timetable of Research Month Dissertation Activity September 2017 Introduction September-October 2017 Literature Review October 2017 Methodology October-November 2017 Data Analysis November 2017 Discussion and Conclusion December 2017 Finalizing References Borzaga,C., Tortia,E.(2006).Worker motivation, job satisfaction, and loyalty in public and nonprofit social services. Nonprofit and Voluntary Sector Quarterly, 35 (1), 225-248. Danish, R.Q., Usman, A., (2010).Impact of Reward and Recognition on Job Satisfaction and Motivation: An Empirical Study from Pakistan. International Journal of Business Mangement, 5(2) Durst, S.L., DeSantis, V.S. (2007). The determinants of job satisfaction among federal, state, and local government employees. State and Local Government Review, 29(1), 7-16. Gaertner, S. (2010). Structural Determinants of Job Satisfaction and Organizational Commitment in Turnover Models. Human Resource Management Review, 9(4), 479-493. Hagedorn, L.S. (2007).Conceptualizing faculty job satisfaction: Components, Theories, and outcomes. In. L.S. Hagedorn (Ed.), what contributes to job satisfaction among faculty and staff: New directions for institutional research, 105 (1), 5-20 Judge, T.A., Heller, D., Mount, M.K. (2012).Five-factor model of personality and job satisfaction: A meta-analysis. Journal of Applied Psychology, 87(3), 530-541. Moynihan ,D.P Pandey ,S.K.,(2007).Finding Workable Levers over Work Motivation Comparing Job Satisfaction, Job Involvement, and Organizational Commitment. University of Wisconsin-Madison, the University of Kansas, Lawrence. A sage publication.

Sunday, December 1, 2019

Miss Caroline Letter Essay Example

Miss Caroline Letter Essay Miss Caroline Letter Hey Dairy, Youll be happy to find out your little sister got to teach her first class! Today, I taught grade ones at Macomb down in Southern Alabama. Things are deferent around here Very different. This one little gal named Scout already knew how to read! Can you believe that? Her parents are teaching her the wrong way! The poor little girl knows nothing about real education. But luckily Ill be here to gulled her In the right direction. Also, you wouldnt believe how poor these kids are! I lent one of the boys, Walter, a quarter so the starving kid could have some lunch. He couldnt pay me back ICC! These kids will eventually clean out my wallet. I knew thing were different In the south but I had no Idea how different their lifestyles were. I had a rough start on my first day, but with my teaching skills, I can mold them Into proper children. Im missing you and everyone back home terribly, but the longer Im In the south the longer Im fixing a childs life. Hope to see all of you soon! Lots of love, your little sis We will write a custom essay sample on Miss Caroline Letter specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Miss Caroline Letter specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Miss Caroline Letter specifically for you FOR ONLY $16.38 $13.9/page Hire Writer

Tuesday, November 26, 2019

Identity Changes for Elie Wiesel Essays - Holocaust Literature

Identity Changes for Elie Wiesel Essays - Holocaust Literature Daniel Kang Ms. Menard Honors English 8 24 January 2014 Identity Changes for Elie Wiesel Identity, a pure and changing trait, changes for Elie Wiesel throughout the story Night. Identity a chameleon changes colors according to the surroundings. Alike the saying "everybody is different" everybody's identity differs uniquely in their own way. Identity proves what one becomes. If a person loses their identity, they become nothing, just a body and a corpse. Night by Elie Wiesel, proves a horror story about Elie's adventure through the Holocaust. This story proves many points: Elie's faith, family and friends, and his urge to support human rights around the world. Elie survives the Holocaust to write this book; however, the shocks of the Holocaust never leave his mind. Many things change in Elie throughout the Holocaust, his faith in God changes from the beginning of the Holocaust to the end. He still believes that God exists but that man proves greater. Before the Holocaust, like Moses, he praises and worships God. He studies Talmud in the daytime and runs to the synagogue and prays at night. When Moishe the Beadle, "the jack of all trades" (Wiesel 3) asks Elie why he prays, he says, "Why did I pray? Strange question. Why did I live? Why did I breathe" (Wiesel 4). Elie compares praying to his life and his breathing. He says the reason he lives is to pray. During the Holocaust, Elie's faith in God changes drastically. He believes that God abandons the Jews. "Praised be Thy Holy Name, for having chosen us to be slaughtered on Thine alter" (Wiesel 67)? This proves that Elie believes God deserts them while Jews, being thrown in the fire, a roaring mountain of fiery flames, occurs as a regular event. Some say Elie looses his faith and becomes an atheis t, but evidence shows in this quote that God makes him furious for not helping out the Jews. However, after the Holocaust, Elie shows a change in faith. He begins to believe in God. He says, "But I have faith. Faith in the God of Abraham, Isaac, and Jacob, and even in His creation." (Wiesel, "Nobel," 120). Elie after the terrible horrors he faces trusts in God once more. Faith, a fickle thing, changes much for Elie, before, during, and after the Holocaust. Elie's identity changes many times during the Holocaust. Family means a lot to many people. Family and friends matter to Elie a lot before the nightmare starts. "My hand tightened its grip on my father. All I could think of was not to lose him" (Wiesel 30). Not wanting to lose his father he keeps him close. The Holocaust years changes Elie's view of his family, mainly his father. "And he began beating him with an iron bar. At first my father simply doubled over under the blows, but then he seemed to break in two like an old tree struck by lightning. I had watched it all without moving. I kept silent" (Wiesel 54). Idek, the Kapo of their Kommando beats Elie's father, and Elie ensures to not move and stays silent watching his father get beat. His love for family greatly diminishes during the Holocaust. The horrors of World War 2 impacted Elie and his family greatly; after the war though, Elie remembers his father and mother and siblings he lost during the Holocaust. "And yet, I sense t heir presence. I always do - and at this moment more than ever. The presence of my parents, that of my little sister. The presence of my teachers, my friends, and companions" (Wiesel, "Nobel," 118). He still remembers his family and friends after the war. He still adores them. Love for family changes along his winding and horrifying adventure of ups and downs for Elie Wiesel.

Friday, November 22, 2019

Ipso, Meso, and Peri Substitutions in Organic Chemistry

Ipso, Meso, and Peri Substitutions in Organic Chemistry   The prefixes ipso-, meso-, and peri- describe ring substitutions in organic chemistry. They are part of the IUPAC nomenclature used to specify the position of any non-hydrogen substituents in an aromatic hydrocarbon. Ipso Substitution The ipso- prefix is used when  two substituents share  the same ring position in an intermediate compound. This could occur  in an  electrophilic aromatic ring substitution. Meso Substitution The meso- prefix is used when  substituents occupy a  benzylic  position when the  first carbon covalently bonds  adjacent to a benzene or other  aromatic  ring. It is seen in acridines and calixarenes. PeriSubstitution The peri- prefix is used to describe substituents at the 1 and 8 positions. It is seen specifically in naphthalenes. In addition to ipso, meta, and peri, there are two other ring substitution patterns you may encounter. There is the ortho, meta, and para substitution and the cine and tele substitution. Cine and Tele Substitution In the cine- substitution, the entering group is positioned adjacent to the one that was occupied by the leaving group. This is seen in aryne chemistry. In the tele- substitution, the new position of the entering group is more than one atom further away on the aromatic ring.

Thursday, November 21, 2019

Conformity Assignment Example | Topics and Well Written Essays - 250 words

Conformity - Assignment Example In my current workplace, however, there are rules regarding the dressing code. There were several occasions where I was reminded by the Human resource manager to adhere to the set guidelines. With time, I conformed to it. There are several factors that should be put into consideration before making a decision as whether or not to conform to the group. Physical and psychological factors are crucial in this determination. Physical factors involve the overall appearance of the group in terms of its size and composition of the group. Psychological factors involve the culture of the group in terms of the behavior of the members, its social and religious beliefs (Smith and Bond, 1996). Group think is the tendency of approaching and solving issues as a group rather than individuals taking up responsibility for the actions (Turner and Pratkanis, 1998).Group thinking mainly results to ineffective and inefficient decision making because essential information that would have helped in better decision making is withheld. There are numerous signs that may show the existence of group thinking mentality. One of the signs is the manifestation of pressure on an individual who seems to disagree with the view of the majority. Members also convince themselves that despite any evidence that contradicts their stand, the original decision is the appropriate one. There is also a tendency of the group to stick to the same decisions going forward whenever they succeed (Janis, 1972). Turner,M.E.&Pratkanis,A.R.(1998).†Twenty-five years of groupthink theory and research: lessons from the evaluation of a theory†Organisational Behavior and Human Decision Processes

Tuesday, November 19, 2019

Texting in the Workplace Paper Research Example | Topics and Well Written Essays - 1250 words

Texting in the Workplace - Research Paper Example Its impact to the society is vast but is still in an on-going debate whether it is advantageous or not. For some, the use of text messaging is useful at work because of the fact that a person can still be reached even when he or she is not around the office, in terms of communication with client, and others. However, text messaging is also seen as a hindrance for a productive work because of the time people spend on it, the distraction it gives, and others. This paper has examined and evaluated a few among the literatures that can help the author assess the impact of text messaging in the workplace to give some indications that can help in the future career. II. Report Mobile phone has been a device that is widely distributed in the world. For some, it has been a necessity just like parts of their everyday lives. However, its impact to the society is still being explored through various researches. Some claim the advantages that mobile phone has contributed to them while the others s tates its disadvantages to the society. However, one certain impact of mobile phone has been noted. Through mobile phone, text messaging has turned out to be a form of mass communication in the society (Rheingold, 2002). ... This review aims at providing a cursory outlook on texting in the workplace and may not be a representative of the complete array of information concerning text messaging. Indeed, text messaging is proven to be advantageous in some points but text messaging that is situated in the workplace is still an on-going discussion. According to Langer (2008), researches concerning text messaging in the workplace are only limited. For Daft and Lengel, text messaging is much more suitable for task-based communication (as cited in Hu, Wood, Smith & Westbrook, 2004). On the one hand, on an account on text messaging, Galushkin’s (2003) claims that text messaging has the ability to be a rich medium in distributed organizations. In such a way, text messaging is asserted to be a more important means of communication and also that it has the more advantage of its ability to facilitate a communication which is fast even if the users are distant to each other. However, the disadvantage of text me ssaging is the less rich quality of communication because it lacks the audio and visual aspect, facial expression, body language, tone of voice as well as the other non-verbal forms of communication. In terms of work related communication, Galushkin (2003) expresses that the advantage of text messaging is when the employee does not feel inferior when addressing his or her superior. Because of this feeling of inferiority, productivity at work is at stake for the uneasiness and apprehension to talk or ask his or her boss. Productivity can be ensured as well given that the time spent on communication is usually shorter than face to face interaction. Text messaging is really much more efficient because of the advantage of having

Sunday, November 17, 2019

The advantages and disadvantages Essay Example for Free

The advantages and disadvantages Essay The difference it will make is that it will not have colour and will only be in black writing. It is good for beginners to practice typing. You can not put in pictures or borders. It takes very little memory. It is not a good application for professionals. Microsoft Access Open Office Base It is the same but the steps of doing things are totally different. It is very fast and reliable. It is rare so if you need help then you are less likely to get help. If I used it then I can do my work faster because it is very easy to use. It is similar to Microsoft Access so it is easy to use. It has much less features than Microsoft Access. It is easy and straight forward. It takes up a lot of memory. Microsoft Internet Explorer 6 Mozilla Firefox It works almost the same but it is faster. Mozilla Firefox is faster than Microsoft Internet Explorer 7. It takes quite a bit of time to download from internet. The difference it will make if I used it is that I will be safer on the web. It is good because it has security which stops viruses and hackers. You have to pay for it because it does not come free. You can get information, play games and email really fast. It is a bit advanced so it may be hard to use for some users. Paint Adobe Photoshop It works almost the same as paint. You are able to change the colour of the picture. The images take up a lot of hard disk memory. The difference it will make is that I will be able to draw more accurate images than paint. It has more options and tools than paint. It does not come with the computer; you will have to buy it. You can also make changes in photos etc. It is a bit hard to use, so experienced people can use it. Microsoft Word Microsoft Access Microsoft Internet Explorer 6 Paint Input An input device is that hardware which allows you to put data into the computer. The main input devices I have used are keyboard, mouse and scanner. Device Speed Errors that can be made Way to correct errors Keyboard The keyboard does not have a set amount of speed it all depends how fast the typist is typing. The speed is calculated in Words Per Minute (WPM). The errors which can be made are that you can type in a word by mistake or do spelling mistakes. If you have typed a word wrong then you have to press back space or if it is a spelling mistake then put the spell check on which underlines the mistake in red. It then gives you a list of words to correct to. Mouse The speed of the mouse actually depends on how fast you move the mouse. You may click on icon which you did not want to press. You have to press back or if t has opened an application then exit it. Scanner The speed of the scanner depends on how powerful the scanner is. The more powerful the faster. Latest models will have more power. You might want to see what goes on in scanner and will lift the lid up. You have to wait till the scanning finishes then you have to repeat it all over again. Keyboard The way I detected my errors is that I checked my work twice. The way I corrected my errors is that I clicked the underlined words and chose a suitable word from the list. Spelling mistakes are underlined in red like this and grammatical mistakes are underlined in green like this. If there was none suitable then I would re-type the correct word. Thereafter I gave it to friend for proof reading. Mouse The way I detected the errors is that when I went on an unwanted page. The way I corrected it is that I simply went back. To prevent such errors; I done my work slowly. If I was on the internet and I made a mistake then I would click the button called BACK which is on the top left corner. Scanner After the image was been scanned, I checked if there were any mistakes in the digital image. If there were any then I restarted the scanning. The way I prevented these errors was that before scanning I made sure that the page was the right way round and having no creases on the paper. Effects of Inaccurate Data Inaccurate data will affect the system by mainly consuming time and causing problems for customers. Data Effect Way it can be prevented Name spelt incorrectly If the name is spelt incorrectly then when the tickets reach the person and the name does not match the name on the passport then the person can not go abroad. The way it can be prevented is that tell the customer to repeat it twice. Also tell the customer to say it in phonetics. And lastly, confirm before putting the phone down. Address not correct, such as postcode If the address or the postcode is not correct then letters may not reach the person and go elsewhere. The way it can be prevented is that tell the customer to repeat it twice. Also confirm before putting the phone down. For the postcode I shall also keep an input mask which is LL0\ 0LL. Recommendations not checked correctly If the recommendation is not checked correctly then customers may not get the offers which they have the right to get. The way it can be prevented is that make sure that the recommendation is there and recheck it at a later stage. Gender not entered correctly If the gender is not entered correctly then a staff could put a customer to shame if it is said wrong over the phone. The way it can be prevented is that tell the customer to repeat it twice. Also confirm before putting the phone down. Also I will make sure that nothing other than male or female is entered into the gender. I will do this by entering a validation rule and validation text. This means that every time something is typed wrong in that field than it will not be valid and then a message will come up say what to do. Date of birth not entered in correct format If the date of birth of birth is not entered in the correct format then part of the database could go wrong and it would also cause problems to the customers if it is in the wrong format on tickets and letters. The way it can be prevented is that keep a strict format that all the staff could stick to. Also recheck if it is entered according to the format. And if talking to the customer over the phone then ask which format it is. For example; DD/MM/YY or MM/DD/YY or YY/DD/MM. I have also thought of having a set format for the date of birth. To maintain this I shall have an input mask which is 00/00/0000;0;; Subscriptions not entered in correct format If the subscription is not entered in the correct format then the subscription could go on and on for ever if the expiry date is not entered correctly. The way it can be prevented is that recheck if the date is there and it is entered correctly with the correct format. For this also I will have a set format and to maintain this I will an input mask which is 00/00/0000; 0;; I think that the overall best method of checking the accuracy of the data is that it is rechecked and confirmed. Also I would prefer having an input mask where possible in places like date of birth and post code. Validation It is very important that you have correct and accurate data or else this could lead to many major problems. Validation is a very good way to ensure that you have the correct data. Validation is when the computer itself automatically checks the work and makes sure that the data entered is reasonable but it does not check the accuracy. The main aim of validation is that it makes sure that the data entered is reasonable, allowable and sensible. For example; if you typed in the date of birth of a secondary school student then it is likely to be between 1988 and 1995. If 1955 was entered then it would definitely be wrong and the computer will not accept. This is making sure that the data is reasonable. If Sams date of birth is 1992 and 1989 was typed then it will be still accepted but the data is not true. This is not checking the accuracy of the data. The following are a few methods of validation: 1. Presence check This checks that data has been entered into a field. An example of this method is; * In most databases a key field can not be left empty. 2. Check digit The last one or two digits in a code are used to check if all the other digits are correct. An example of this method is; Â  In shops and super markets, barcode readers use check digits. 3. Type check This checks that of a certain type is entered into a field. An example of this method is; In a clothes shop, dress sizes may range from 8 to 18. For this type of data, a number data type would be suitable. If the data type is set as number then only numbers could be entered and a person will be prevented form typing in letters and words. If size ten or eleven was entered, then it would be rejected and 10 or 11 would need to be entered. 4. Format check This checks if data is in the correct format. An example of this method is; Â  A National Insurance number is in the form LL 99 99 99 L. In which L is any letter and9 is any number. 5. Spell check This looks up words in a dictionary. An example of this method is; Â  When word processing. 6. Length check This checks that the data entered is not too long or too short. An example of this method is; A password which needs to be six characters long. 7. Range check This checks that a value fall within the specified range. An example of this method is; Number of hours worked must be no more than 50 hours and more than 0 hours. 8. Look up table This looks up acceptable values in a table. An example of this method is; Â  There are only seven possible days in a week. Verification Verification is to check if the data meets the required standards. For example; if a password is created, then you have to verify by typing it a second time to see if they both match. If the passwords did not match each other then the computer does not allow him to go through because the required standard is that the passwords must match each other and must be typed in correctly. The following are a few methods of verification: 1. Re-typing the data Re-typing the data could get rid of a lot of mistakes. This method is only ideal for small amounts of data such as passwords. However, also in small amounts of data there is also a problem which is that the mistake could be repeated in the second piece of data and this does not pick up the mistake. The reason why it is not ideal for large amounts of data is for three main reasons. They are as follows; You would end up with two copies of the data Mistakes which are repeated will not get picked up. Â  It would be time consuming to re-type large amounts of data. 2. Checking the data on the screen with the original paper document This method saves having to re-type the data. It can help where in data has been transposed or entered incorrectly. However, it is not easy and can get tough trying to move your eyes back and forth paper copy and monitor. 3. Printing out a copy of the data and then comparing it with the original copy. This is probably the easiest method because you bath copies side by side and you can check for mistakes. However, this method can also become time consuming if large amounts of data have to be checked. Also if you go too quick the mistakes could be left. Output Output device allow you to view information after it has been processed. Device Type The way it works Advantages Disadvantages Best place to use it Printer Laser In laser printers powdered ink is fused on to paper by heat and pressure. They use toners instead of cartridges. They produce a very high quality of output. Laser printers are very expensive to buy. The best place to us it is in a library or any study area because they are very quiet and fast. Laser printers are very quiet and do not disturb. Toners are used instead of cartridges this means that there may be extra costs. Hundreds of pages could be printed within an hour. They are very huge so if there are any breakdowns then repairs could be very costly. Inkjet Inkjet printers work by heating ink as it flows through small nozzles. It then creates a dot on the paper and keeps happening until a picture forms. Ink is stored in cartridges. It is quite fast but not faster than Laser printers. The quality of colour printing is very low. The best place to use it is in your house because it is cheap and it is worth the price. Print outs are very neat compared to other print outs. Print out may come out wet and this may smudge. Nozzles are much cheaper than toners. Inkjet printers are very noisy. Dot-matrix Dot-matrix printers work by using a set of steel pins which strike an inked ribbon onto paper producing a sequence of dots. Dot-matrix printers are cheap to buy. They are very noisy and disturbing. The best place to use it would be something like a factory because they make a lot of noise and in a factory printers are used very less. It is very cheap to operate. They are very slow and take ages. They are not very hard to use. You can not make colour copies. Monitor TFT Thousands of tiny dots called pixels are displayed which then create an image. TFT monitors are very slim and take up less space. TFT monitors are very slim and can easily get knocked over. The best place to use a TFT monitor would be in an office or an ICT room because It would be less stuffy and more nice and comfortable to use. They create very less heat in the room. They can produce dull and low quality images if the monitor is not good. TFT monitors are not made of glass so the screen will not break. The screen can be damaged if it is poked many times. CRT Thousands of tiny dots called pixels are displayed which then create an image. CRT monitors are big and hard to get knocked over. They create a lot of heat and it can get very stuffy in the room. The best place to use a CRT monitor would be in a nursery where there are lots of small children and the chances of getting damaged are very high as the children will be running about. CRT monitors They are very cheap. They take up too much space and they are less stylish. They are hard to be stolen because they are massive. CRT monitors can make a lot of noise. After looking at all the different types of input devices, my work has been affected greatly. I have also tried my best to use the best out of all the output devices in my task. Conclusion Most of the components and other things I used for my tasks were very suitable. For example, a CRT monitor can not be used in an office and a TFT would be the best.

Thursday, November 14, 2019

Johnny got his gun Essay -- essays research papers

Johnny Got His Gun Johnny Got His Gun is a striking literary work about a young man, Joe Bonham, and his internal struggles following a devastating war injury. He lost his arms, legs, and face. Dalton Trumbo, the author Johnny Got His Gun, allows the reader to know Bonham's thoughts, but nothing more. The reader follows Joe's progression toward and away from insanity, and between hope and despair. Trumbo shows this progression through the use of a plethora of literary techniques. Characterization is one of the most extensively used techniques. A great deal can be understood about Joe's feelings and thoughts by seeing how he interprets characters. The reader ponders many ideas when thinking about characterization used in this book: reality of characters, stereotyping of characters, and motivation of characters. In order to make sense of this book, the reader needs to assume at least one character to be real. Joe is most easily assumed real. The crux of this book is criticism of war, and the criticism becomes most apparent if Joe is real. Reality of other characters is difficult to distinguish. The people Joe remembers are real, at least to him. He has memories of their personalities and what they looked like. He can recall specific memories of events with these people. There are also characters Joe encounters while he is lying in his bed after the accident. These characters are very flat. They do not develop, and we know little about their thoughts or emotions. Joe only kn...

Tuesday, November 12, 2019

Finance And Families Essay

The population heterogeneity theory forecasts that, stress resistance is closely attached to mortality. Accordingly, persons in a population who pass away prematurely in life will likely be individuals who are less resistant to environmental stresses. Those persons with a high longetivity are those individuals who are very resistant, and these persons as a grouping might have an extremely gradually increasing rate of mortality, yielding an estimated mortality level while the less- resistant clusters pass away. (Viano, E, 1992) Two different perspectives on the causes of marital violence: (Viano, E, 1992, p.158) i.Feminist perspective: This perspective argues that, violence in the family is created by a patriarchal society in which the power of the male dominates. Historically, marital violence is viewed as been condoned by values as well as norms in the society. Consequently, one of the concrete subjects that the battered woman’s faction is confronted with is defying the tendency of the psychological health profession to renounce a feminist analysis.   ii.Sociological perspective: This perspective argues that, physical violence is not a manifestation of individual pathology. However; it is an essential feature of human association. Physical violence is viewed as almost normal and widespread, in other words, statistically common and ethnically accepted, feature of family life. Therefore, environmental interferences and social system are thought suitable. What is â€Å"double jeopardy† risk regarding women being victims of marital violence? â€Å"Double jeopardy† refers to individuals who are more at danger than the general populace since they are fatalities of other types of oppression: The following groups of females are at risk: (Viano, E, 1992) Ø   Disabled women and girls:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Disabled girls are four times more probable (than the nationwide standard) to be sexually maltreated.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Approximately 53% of women who have been disabled since birth have been maltreated, raped or physically attacked.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Approximately 83% of disabled women will be sexually or physically attacked. Ø   Aboriginals /First states:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   An approximated 57% of indigenous females have been sexually maltreated.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The rate of sexual abuse in children in a number of aboriginal societies is as elevated as 75 to 80 % for young women below the age of 8 years. Ø   Fresh Canadians:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dread of the police as well as fear of being exiled frequently keep expatriates and migrant females from reporting family mistreatment. (a)What is child abuse? Child abuse is the emotional/mental or physical ill-treatment of children. The Centers for Disease Control and Prevention (CDC) describes child mistreatment as every act or sequence of taking action or omission or commission by a care giver, parent or other close relative that results in injury, potential injury, or treat of injury to a child. The majority of child abuse takes place in a child’s residence, with a lesser amount taking place in the schools, associations or groups of people the child intermingles with. There are four main types of child abuse: sexual abuse, emotional/mental abuse as well as physical abuse. (Franchi, C, 1987, p. 1) (b)The prevalence of child abuse in the United States: According to the 1997 American National Committee to prevent child abuse, neglect represented approximately 54% of established incidences of child abuse, corporal abuse 22%, sexual exploitation 8%, and additional forms of mistreatment 12%. A report on the well-being of the child by UNICEF affirmed that, the United States ranked lowest amongst developed countries with reverence to the welfare of children. This investigation also established that child abuse and child neglect are far more widespread in families with a single parent than in family units with both parents. (Franchi, C, 1987, p. 1) A study recently carried out by the Center for Disease Control and Prevention established that, approximately 1 in 50 babies in the United States are fatalities of nonfatal maltreatment or neglect. In the U.S, neglect is described as the failure to meet up the fundamental wants of the children comprising food, clothes, shelter as well as access to health care. Researchers established more than 91 000 incidences of neglect within a span of one year (beginning October 2005-September, 2006) with their information emanating from a list of cases authenticated by protective services organizations. (Franchi, C, 1987, p. 1) 5. The concepts and principles f Social Learning Theory:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The social learning theory is the theory that people are taught novel behavior through punishment or explicit reinforcement, or through observational studying of their environment’s social actors. If individuals observe optimistic, desired results in the observed conduct, they are more probable to emulate, adopt or model the conduct themselves. (Akers, R, 2009) Social learning theory is obtained from Gabriel Tarde (1843-1904)’s work which suggested that social learning takes place through four major stages of limitation: (Akers, R, 2009) à ¼Ã‚   Comprehending of concepts à ¼Ã‚   Imitation of seniors. à ¼Ã‚   Close contact. à ¼Ã‚   Role model conduct. REFERENCE LIST Akers, R. (2009) Social Learning and Social Structure: A General Theory of Crime and Deviance. Transaction Publishers.ISBN:1412809991, 9781412809993. Franchi, C. (1987) Child abuse and its consequences: observational approaches. CUP Archive. ISBN: 0521316146, 9780521316149. Viano, E. (1992) Intimate violence: interdisciplinary perspectives. Taylor & Francis. ISBN: 560322446, 9781560322443.

Saturday, November 9, 2019

Leadership Styles Management Essay

→ Production-centered managers – set rigid work standards, organized asks down to the last detail, prescribed work methods o be followed and closely supervised their subordinates’ work → Employee-centered managers – encouraged subordinate participation in goal setting and in other work decisions and helped ensure high performance by inspiring trust and respect most effective leadership Most effective leaders were those who had supportive relationships with their subordinates, tended to use group rather than individual decision making, and encouraged their subordinates to set and achieve high performance goals. Managerial Grid (Blake and Mouton Studies) developed by Robert Blake and Jane Mouton identifies 5 different types of management behaviors based on the various ways that task-oriented and employee-oriented styles can interact with each other Style 1,1 (impoverished management) – low concern for people, low concern for tasks or production laissez-faire management – leader abdicates his or her leadership role Style 1,9 (country club management) – high concern for employees, low concern for tasks Style 9,1 (task or authoritarian management) – high concern for production and efficiency, low concern for employees Style 5,5 (middle-of-the-road management) – an intermediate amount of concern for both production and employee satisfaction Style 9,9 ( team or democratic management) – high concern for both production and employee morale and satisfaction ; most effective leadership behavior Hi. Alam kong FC ako sa ginagawa ko pero di ko na talaga matiis eh. Haha. Sorry kung na-intrude ko ang privacy mo dito sa FB. Masyado lang kasi akong na-mesmerized dun sa story mong ICH Book 1. Di ko nga alam kung gagamit ako ng â€Å"po at opo† o tatawagin kitang â€Å"Ate† habang tinatype ko to.Haha. Kahit hindi ako nagcocomment sa updates mo (sorry po, tinatamad kasi akong gumawa ng account doon :D), gusto ko lang sabihin na nagustuhan ko yung plot ng story mo at grabe ang kaba ko habang papalapit na ako sa ending. Kahit ending na sya, naramdaman ko pa rin yung â€Å"thrill†. Hindi nakakasawang ulit-ulitin. Noon pa, curious na talaga ako sa identity mo pero may hint na ako na sa UP ka nag-aaral dahil dun sa jeepney ekek na nasabi mo. :3 â€Å"Curiousity killed the cat but satisfaction brought it back.† Wala lungs trip ko lang po isingit to. Mehehehe. Nakita ko po kasi yung link para sa FB account mo kaya ni-click ko na. XD First time kong mag-message sa isang writer ng story kaya pagpasensyahan mo na ako kung mukhang walang sense itong na-type kong message. Wahaha. Yun lang, byebye. =) FC ako, SORRY po ulet. :)))) System 4 Management Rensis Likert, incorporating the basic style categories of task orientation and employee orientation, devised his own model of management effectiveness. Four Leadership Systems System 1 characterized as exploitive and authoritative Managers make all work-related decisions and order their subordinates to carry them out. Failure to meet the managers’ goals results in threats or punishments. Managers have little trust or confidence in subordinates. Subordinates fear the managers. System 2 benevolent authoritative Subordinates who meet or exceed the managers’ goals may be rewarded. Managers have a condescending attitude toward their subordinates and subordinates are cautious when dealing with their managers. System 3 consultative Managers set goals and issue general orders after discussing them with subordinates. Subordinates can make their own decisions about how to carry out their ttasks. Rewards are used to motivate subordinates. Subordinates feel free to discuss most work-related matters with their managers, who, in turn, feel that to a large extent subordinates can be trusted to carry out their tasks properly. System 4 participative Likert’s final and most favored management style Goals are set and work-related decisions are made by group. To motivate subordinates, managers not only use economic rewards but also try to give their subordinates feelings of worth and importance Performance standards exist to permit self-appraisal by subordinates, rather than to provide managers with a tool to control subordinates. Interaction between managers and subordinates is frank, friendly, and trusting. Low productivity → Systems 1 and 2 styles High productivity → Consultative or Participative leadership style System 4 management → desirable management in a wide variety of work situations ———————– High in consideration Lowest turnover rates Highest employee satisfaction Low in consideration High in initiating structture High grievance and turnover rates

Thursday, November 7, 2019

Evidenced Based interventions in Mental health The WritePass Journal

Evidenced Based interventions in Mental health Introduction Evidenced Based interventions in Mental health ). As noted in the earlier part of this discussion, intervention involves a two-way dialogue process between the healthcare professional and the service user and therefore there is a continuously movement between the two entities as the professionals look for the best way to achieve the desired result by observing the activities of the service user . The service user is also then learning about the aspects of their treatment, which are being particularly productive with a view to becoming more self-sufficient over a prolonged period of time. When looking at the concept of learning in this broader sense the entire the entire intervention process facilitated learning can develop with both parties. Learning from each other and creating an effective strategy which may involve a completely different form of intervention at some point or another. It is argued here, however, that continuous learning is the central fact or as to whether or not intervention is ultimately a success. Conclusions By looking at the analysis above it is concluded that evidence based treatment is likely to offer a much deeper understanding of the treatment options available and crucially the practical likelihood of the success of such treatments. Intervention presents a real challenge as picking the precise point and level of intervention and it is argued here that intervention which is patient led will be more likely to be successful in the long run and should form a central part for this type of treatment.   References Chambless, D., Hollon, S. (1998). Defining empirically supportable therapies. Journal of Consulting and Clinical Psychology, 66, 7-18. Griffiths, C., (2007).The theories, mechanisms, benefits, and practical delivery of psychosocial educational interventions  for people with mental health disorders    International Journal of Psychosocial Rehabilitation. 11 (1), 21-28. Kaufman Best Practices Project. (2004). Kaufman Best Practices Project Final Report: Closing the Quality Chasm in Child Abuse Treatment; Identifying and Disseminating Best Practices. Rogers, A., 2003. What is the Difference? A New Critique of Adult Learning and Teaching, Leicester: NIACE. Ryan, P., (2012). Empowerment, Lifelong Learning and Recovery in Mental Health: Towards a New Paradigm. Basingstoke, Palgrave Macmillan. Saunders, B., Berliner, L., Hanson, R. (2004). Child physical and sexual abuse: Guidelines for treatments. Retrieved September 15, 2006, frommusc.edu/cvc.guidel.htm Thomas, M. Burt, M. and Parkes, J., (2010). Chapter 1. The Emergence of Evidence-based Practice, In McCarthy, J. and Rose P. Values-Based Health Social Care: Beyond Evidence-Based Practice. London: Sage.

Tuesday, November 5, 2019

American Presidents Who Owned Slaves

American Presidents Who Owned Slaves American presidents have a complicated history with slavery. Four of the first five presidents owned slaves while serving as president. Of the next five presidents, two owned slaves while president and two had owned slaves earlier in life. As late as 1850 an American president was the owner of a large number of slaves while serving in office. This is a look at the presidents who owned slaves. But first, its easy to dispense with the two early presidents who did not own slaves, an illustrious father and son from Massachusetts: The Early Exceptions John Adams:  The second president did not approve of slavery and never owned slaves. He and his wife Abigail were offended when the federal government moved to the new city of Washington and slaves were constructing  public buildings, including their new residence, the Executive Mansion (which we now call the White House). John Quincy Adams:  The son of the second president was a lifelong opponent of slavery. Following his single term as president in the 1820s he served in the House of Representatives, where he was often a vocal advocate for the end of slavery. For years Adams battled against the gag rule, which prevented any discussion of slavery on the floor of the House of Representatives. The Early Virginians Four of the first five presidents were products of a Virginia society in which slavery was a part of everyday life and a major component of the economy. So while Washington, Jefferson, Madison, and Monroe were all considered patriots who valued liberty, they all took slavery for granted. George Washington: The first president owned slaves for most of his life, beginning at the age of 11 when he inherited ten enslaved farm workers upon the death of his father. During his adult life at Mount Vernon, Washington relied on a varied workforce of enslaved people. In 1774, the number of slaves at Mount Vernon stood at 119. In 1786, after the Revolutionary War, but before Washingtons two terms as president, there were more than 200 slaves on the plantation, including a number of children. In 1799, following Washingtons tenure as president, there were 317 slaves living and working at Mount Vernon. The changes in slave population are partly due to Washingtons wife, Martha, inheriting slaves. But there are also reports that Washington purchased slaves during that period. For most of Washingtons eight years in office the federal government was based in  Philadelphia. To skirt a Pennsylvania law that would grant a slave freedom if he or she lived within the state for six months, Washington shuttled slaves back and forth to Mount Vernon. When Washington died his slaves were freed according to a provision in his will. However, that did not end slavery at Mount Vernon. His wife owned a number of slaves, which she did not free for another two years. And when Washingtons nephew, Bushrod Washington, inherited Mount Vernon, a new population of slaves lived and worked on the plantation. Thomas Jefferson: It has been calculated  that Jefferson owned more than 600 slaves over the course of his life. At his estate, Monticello, there would have usually been an enslaved population of about 100 people. The estate was kept running by slave gardeners, coopers, nail makers, and even cooks who had been trained to prepare French cuisine prized by Jefferson. It was widely rumored that Jefferson  had a longtime affair with Sally Hemings, a slave who was the half-sister of Jeffersons late wife. James Madison:  The fourth president was born to a slave-owning family in Virginia. He owned slaves throughout his life. One of his slaves, Paul Jennings, lived in the White House as one of Madisons servants while a teenager. Jennings holds an interesting distinction:  a small book he published decades later is considered the first memoir of life in the White House. And, of course, it could also be considered a slave narrative. In A Colored Mans Reminiscences of James Madison, published in 1865, Jennings described Madison in complimentary terms. Jennings provided details about the episode in which objects from the White House, including the famous portrait of George Washington that hangs in the East Room, were taken from the mansion before the British burned it in August 1814. According to Jennings, the works of securing valuables was mostly done by the slaves, not by Dolley Madison. James Monroe:  Growing up on a Virginia tobacco farm, James Monroe would have been surrounded by slaves who worked the land. He inherited a slave named Ralph from his father, and as an adult, at his own farm, Highland, he owned about 30 slaves. Monroe thought colonization, the resettlement of slaves outside the United States, would be the eventual solution to the issue of slavery. He believed in the mission of  the American Colonization Society, which was formed just before Monroe took office. The capitol of Liberia, which was founded by American slaves who settled in Africa, was named Monrovia in honor of Monroe. The Jacksonian Era Andrew Jackson:  During the four years John Quincy Adams lived in the White House, there were no slaves living on the property. That changed when Andrew Jackson, from Tennessee, took office in March 1829.   Jackson harbored  no qualms about slavery. His business pursuits in the 1790s and early 1800s included slave trading, a point later raised by opponents during his political campaigns of the 1820s. Jackson first bought a slave in 1788, while a young lawyer and land speculator. He continued trading slaves, and a considerable part of his fortune would have been his ownership of human property. When he bought his plantation, The Hermitage, in 1804, he brought nine slaves with him. By the time he became president, the slave population, through purchase and reproduction, had grown to about 100. Taking up residence in the Executive Mansion (as the White House was known at the time), Jackson brought household slaves from The Hermitage, his estate in Tennessee.   After his two terms in office, Jackson returned to The Hermitage, where he continued to own a large population of slaves. At the time of his death Jackson owned approximately 150 slaves. Martin Van Buren:  As a New Yorker, Van Buren seems an unlikely slave owner. And, he eventually ran on the ticket of the Free-Soil Party, a political party of the late 1840s opposed to the spread of slavery. Yet slavery had been legal in New York when Van Buren was growing up, and his father owned a small number of slaves. As an adult, Van Buren owned one slave, who escaped. Van Buren seems to have made no effort to locate him. When he was finally discovered after ten years and Van Buren was notified, he allowed him to remain free. William Henry Harrison:  Though he campaigned in 1840 as a frontier character who lived in a log cabin, William Henry Harrison was born at Berkeley Plantation in Virginia. His ancestral home had been worked by slaves for generations, and Harrison would have grown up in considerable luxury which was supported by slave labor. He inherited slaves from his father, but owing to his particular circumstances, he did not own slaves for most of his life. As a young son of the family, he  would not inherit the familys land. So Harrison had to find a career, and eventually settled on the military. As military governor of Indiana, Harrison sought to make slavery legal in the territory, but that was opposed by the Jefferson administration. William Henry Harrisons slave-owning was decades behind him by the time he was elected president. And as he died in the White House a month after moving in, he had no impact on the issue of slavery during his very brief term in office. John Tyler:  The man who became president upon Harrisons death was a Virginian who had grown up in a society accustomed to slavery, and who owned slaves while president. Tyler was representative of the paradox, or hypocrisy, of someone who claimed that slavery was evil while actively perpetuating it. During his time as president he owned about 70 slaves who worked on his estate in Virginia. Tylers one term in office was rocky and ended in 1845. Fifteen years later, he participated in efforts to avoid the Civil War by reaching some sort of compromise which would have allowed slavery to continue. After the war began he was elected to the legislature of the Confederate States of America, but he died before he took his seat. Tyler has an unique distinction in American history: As he was actively involved in the rebellion of the slave states when he died, he is the only American president whose death was not observed with official mourning in the nations capital. James K. Polk:  The man whose 1844 nomination as a dark horse candidate surprised even himself was a slave owner from Tennessee. On his estate, Polk owned about 25 slaves. He was seen as being tolerant of slavery, yet not fanatical about the issue (unlike politicians of the day such as South Carolinas John C. Calhoun). That helped Polk secure the Democratic nomination at a time when discord over slavery was beginning to have a major impact on American politics. Polk did not live long after leaving office, and he still owned slaves at the time of his death. His slaves were to be freed when his wife died, though events, specifically the Civil War and the Thirteenth Amendment, interceded to free them long before his wifes death decades later. Zachary Taylor:  The last president to own slaves while in office was a career soldier who had become a national hero in the Mexican War. Zachary Taylor also was a wealthy landowner and he possessed about 150 slaves. As the issue of slavery was beginning to split the nation, he found himself straddling the position of owning a large number of slaves while also seeming to lean against the spread of slavery. The Compromise of 1850, which essentially delayed the Civil War for a decade, was worked out on Capitol Hill while Taylor was president. But he died in office in July 1850, and the legislation really took effect during the term of his successor, Millard Fillmore (a New Yorker who had never owned slaves). After Fillmore, the next president was Franklin Pierce, who had grown up in New England and had no history of slave ownership. Following Pierce, James Buchanan, a Pennsylvanian, is believed to have purchased slaves whom he set free and employed as servants. Abraham Lincolns successor, Andrew Johnson, had owned slaves during his earlier life in Tennessee. But, of course, slavery became officially illegal during his term of office with the ratification of the 13th Amendment. The president who followed Johnson, Ulysses S. Grant, had, of course, been a hero of the Civil War. And Grants advancing armies had freed a vast number of slaves during the final years of the war. Yet Grant, in the 1850s, had owned a slave. In the late 1850s, Grant lived with his family at White Haven, a Missouri farm which belonged to his wifes family, the Dents. The family had owned slaves who worked on the farm, and in the 1850s about 18 slaves were living on the farm. After leaving the Army, Grant managed the farm.  And he acquired one slave, William Jones, from his father in law (there are conflicting accounts about how that came to happen). In 1859 Grant freed Jones.

Sunday, November 3, 2019

How to use a Rubber in Mobile Phones Essay Example | Topics and Well Written Essays - 1250 words - 1

How to use a Rubber in Mobile Phones - Essay Example This paper focuses on mobile technology. Some of the factors to consider when choosing materials for developing a mobile device will include, weight, girth, flexibility of the material and its fitness for the intended purpose. The mobile device market has over the past years evolved to unimaginable extents. There has been the development of space age smartphones with unimaginable capabilities and processing speeds. There has also been vast improvement in the display of such devices in both clarity and size. Many mobile devices have been unveiled by different manufacturers such as Nokia, Samsung, HTC, Apple, Motorola and many more competing for the consumers available. One thing that has been an issue is the safety of such expensive devices when they get to fall or submerge in water. To solve this problem, we focus on Nokia’s N9 and the use of rubber by Nokia to act as a protector to this flagship device. Then Nokia n9 uses an 8 megapixel rear camera that is used for photography. The type of lenses used is Carl Zeiss by Nokia with autofocus and image stabilization property. This camera also comes with a dual led flash light to assist in photography in dark conditions. It is one of the most crucial parts of the phone. The battery in the Nokia n9 is what sustains the life in it. It a lithium ion battery that is internal to the mobile phone. It has a large capacity so that it can power up the large display and the processor together with other auxiliary components. This is the N9’s AMOLED gorilla glass curved screen that covers the whole of the N9 front face. This is a touch screen used for both input and output in this system. It not delicate as such since it is curved hence can resist a little bit of damage. The N9 case is made of polycarbonate that is well brushed. This is where all the components of the phone are housed and firmly head. It is the chassis of the whole device therefore providing the shape and character of this marvelous