.

Thursday, February 28, 2019

Macbeth Critical Approach Essay

The tragic story of Macbeth is a tale of a man, who spirals into a deep, dark, depressing life attempting to escape his unhappy, mundane, unsatisfied existence. All of this would non be possible without the assistance of three wicked witches. These witches serve as a catalyst for the evil brought out of Macbeth, which becomes amplified by his avouch flagitious actions.While Macbeth is cold hearted and dark minded his intentions were not awakened work on he encountered the witches who changed his coarse of history. Stay, you imperfect speakers. Tell me more. By Sinels demise I k straight off I am Thane of Glamis tho how of Cawdor? After the witches put forward him he is destined to be king, Macbeth becomes interested. He fell for evils trap and now hopelessly tumbles d possess the rabbit hole.Macbeth knows what he is destined to be but Duncan stands in his way. This leads Macbeth to the first step of his corruption, through his sinister thoughts he realizes he is descending int o darkness. Stars, hide your fires Let not light see my morose and deep desires Fearing he will be discovered for his true self, he pleas to the stars so that they may dim their lights. This fear is what drives him further into madness and deeper into his own despair.Macbeth has destroyed everything that has mattered to him, his best friend, his king, his wife, and his relationship with his people. He has ruined so oft that it becomes clear to him that he was much happier in his previous status. For mine own good, all causes shall give way. I am in blood steppd in so far that, should I wade no more, reversive were as the tedious as go oer By comparing his own actions to a river of blood he hints to the fact that once a man kills for his own single benefit, there is no breathing out back. He has gone too far and would be nearly impracticable to undo what has been done and seems too tough to live with.

Pythagorean Quadratic

Reflection on Crib Bumpers Tracey Crawford ECE 214 support and Health of Children and Families Kelly Wells November 12, 2012 Kids in Danger website is value beca wont it keeps pargonnts as healthy as c argongivers much call fored education on recalls of certain things that are not safe for younger chelaren. Kids in Danger website does have info on other website you displace go to get much teaching round the product as wellhead as numbers you can call.This website gave me a lot of information on crib bumpers pads and why they were recall. out-of-pocket to an incident that happen in 2009 where 6-month-old Aiden died because of a crib bumper pad he rolled into and couldnt get out. His grandmother who got kids in danger twisting on the importance of crib sanctuary and the danger of bumper pads told this story. We use this information by creating brochures or even books with activities that the parents as well as the caregivers to the safety on using products safe.We can even have seminars that would not terms too much for pile to attend to give the importance on why certain toys and products have to be recall because to a greater extent and more children are dying of things that can be keep backed. We could also teach parents rough how to use both(prenominal) of the product than just using what is read in the book because some of the products do come with instructions but people still could be putting it together wrong. If we educate more and more people on what is happening in the manufactures and why it happen than at that place would not be so much last.This information is essential to parents and caregivers on this information than there would not be so much deaths and sobering injuries. I feel that parents need to know this information because if it were their own child or a family member they would want to know what they could do to prevent this from happening to them. I know we as people need to arouse up and see what is going on in ou r neighborhoods as well as what is going in our home because the people who building this items are not paying close attention to how they are do stuff.Last twelvemonth I had a cousin who was 9months old who almost choke to death on a piece of toy that felt out the corner of a toy her dad was building for her brother. It really scares me to the point that I always make sure toys are very sturdy out front I decide to let my kids play with them or kids in my care. I want my brochure to be of some help of the hazardously things that are been build today. I would like for my brochure to be somewhat use in the classroom or out in public. References Improving Childrens Product Safety. Kids in Danger. Retrieved on November 12,2012 from www. kidsindanger. org/product-hazard/crib-bumpers/Pythagorean QuadraticEven though Ahmeds half of the map doesnt indicate which direction the 2x + 6 paces should go, we can assume that his and Vanessas paces should end up in the same place. I sketched th is out on scratch paper I truism that it forms a right triangle with 2x + 6 being the length of the hypotenuse, and x and 2x + 4 being the legs of the triangle. Now I know how I can use the Pythagorean Theorem to solve for x. The Pythagorean Theorem states that in either right triangle with legs of length a and b and hypotenuse c, these lengths have the facial expression of a2 + b2 = c2. Let a = x, and b = 2x + 4, so that c = 2x + 6.Then, by putting these measurements into the Theorem compare we have x2 + (2x + 4)2 = (2x + 6)2 The binomials into the Phythagorean Therom x2 + 42 + 16x + 16 = 42 + 24x + 36 are the binomials squared. This a 42 on two sides of the equation which can be (-42 -42) recouped out first divergence the equation to be x2 + 16x + 16 = 24x + 36. Next we should Subtract 16x from both sides of equation, which then leaves us with x2 +16 = 8x + 36. The next step would then be to subtract 36 from both sides to get a result of. x2 -20= 8x. Finally we need to su btract 8x from both sides to get x2 8x 20 =0.Now we have a quadratic polynomial equation to solve by factoring and using the zero factor. (x ) (x + ) = 0 Since the coefficient of x2 is 1 we can start with a pair of parenthesis with an x in each. Since the 20 is negative we know there will be one + and one in the binomials. I noticed that in lodge for a number to multiply to -20 and add up to -8 the numbers would then have to be -10 and 2. So when I put that into the pair I ended up with (x 10)(x + 2) = 0 Use the zero factor belongings to solve each binomial. Then I set each equation up to zero which made, x 10 = 0 or x + 2 = 0 creating a compound equation.When I did the math and lick for each problem, I got the answer of x = 10 or x = -2. These are the possible solutions to our equation. However, one of these solutions will not work because it doesnt work with this scenario at all. You cannot have negative paces in this equation because it would scarce not make sense, so th e -2 solution does not work, leaving us with the answer of x = 10 as the key number of paces. The treat lies 10 paces north and 2x + 4 = 2(10) + 4 = 24 paces east of stronghold Rock, or 2x + 6= 2(10) + 6 = 26 paces straight from the rock. After figure out this problem I went to howstuffworks. om to read the discussion on how GPS works. This article explained things about the GPS that I never knew before. I learned a great appoint from this article and found a lot of parallels between the article and this assignment. I noticed in the article it discussed trilateration and I thought it seemed very similar to the Pythagorean Theorem, being that 3 points are identified between you, the broadcast, and the repair you are trying to get to which almost forms the shape of a triangle, although it is removed more complex than that and is using circles instead of triangles.However the way I saw it is that my position and where I am trying to go would be the legs and the satellite that i s directing me to my location from my current position, would have to be a 450 angle, making it the hypotenuse. If one was able to put that into numbers or do some picture the distance of the satellite, themselves, one would easily be able to calculate your distance using the Pythagorean Theorem.Using this information a GPS is able to get where you are, how far you are away from your location and the time it will resume to get there, which can be incredibly handy, especially for those who do not have the greatest since of direction. After reading this article it should be that the Pythagorean Theorem is much more useful than I thought. It really simplifies the use of maps and a GPS system. It can be incredibly helpful in many aspects of familiar life.

Wednesday, February 27, 2019

Of mice and men dramatically conveys to us the vital importance of dreams in helping us to deal Essay

Of mice and men dramatic all in ally conveys to us the vital grandness of fantasys in helping us to deal with the often catchy realities of our lives.In this novella by John Steinbeck, some characters had conceive ofs to get them bug out of difficult realities, their hallucinations helped them to combat the loneliness and hopelessness of at that place existence.George Milton and Lenny Small, two poor homeless migrant workers who belonged at oncehere and to know one were doomed to a conduct of wandering and toil, in which they bequeath neve be able to reap the fruits of there labour. The one thing that that kept them strong through this repetitive and shadowy life was a vision. Someday were gonna get the jack in concert and were gonna have a little house and a equate of acres an a cow and some pigs (George- pg 14). It was a dream that was shared out by perpetuallyy American worker, to have a place of their own, the prospect to work for themselves and know one to give th em orders.For Lenny the dream was very oftentimes real, it helped him to cope with the boredom that he faced and he al manners went to calmness happy thinking about tending the rabbits.For George on the other hand, the dream was at first same a fairytale he told Lenny to pose a smile upon his face and the promise of tending the rabbits helped him to stay out of trouble scarcely all the while he was very affirmative about the dream and felt that there was no authority it would live on a reality. Georges first views towards the dream were soon changed when glass over ready out about what they were planning, he offers financial help and suddenly a new view is seen of the dream. This unexpected offer by confect means that the dream is no longer a fantasy and finally all the pain and suffering might have payed off for George, Lenny and Candy besides the threat to the fulfilment of this dream is ever present in Lennys behaviour and in the end its Lennys uncontrollable actions w hich finally record dream.The dream is constantly changing, at first it was just a reputation told by George to cheer up Lenny, then in the middle it seemed like it would come true and finally in the end it was apparent that everyones dreams were tatterdemalion with Lenny as the only exception, because he dies happy with the picture of the dream in his head.Candy wishes to share in the dream with George and Lenny because he is go old and unusable like his dog, he has nowhere to go to and now one to care about him and unlike his dog theyre not handout to take him out and shoot him, instead there going to put him in an old folks home where he will feel lonely and have no freedom.By joining Lenny and George he can live out his days happy and free, forever gum elastic knowing he wont be canned. Once Candy realises that the dream is much or less a reality he stands up for what he believes in with dignity and courage, something he didnt do before he realised the dream was within r each. Candy realises that he doesnt have to be the useless old cripple any longer because he can live the rest of his life happy, without being told what to do. Candys dream ended in a pessimistic way because all he wanted got destroyed leaving him with nothing and thusly left in the same way he was before the dream- old, useless and hanging onto his job by a thread.Crooks dream was to be see and not judged by his colour, he too wanted to live on the ranch with Candy, George and Lenny. Crooks is an example of the bitterness, anger and hopelessness that a black American struggling to be recognised as a human being is faced with. At first Crooks was most cynical about the dream of owning a ranch but the dream was powerful enough to lead him that it was the real thing for a few moments only to be shattered by Curleys wife who made it clear that there is no way a black, crippled outcast such as himself would ever make such a dream a reality. That statement that frizzlys wife made, m ade Crooks realise that he was nothing more than an outcast and what she said was in a way true, with that all the hopes and dreams of Crooks were crushed. same(p) Crooks, Curleys wife is stricken with isolation and sadness. She was out of place on the ranch and because of that she was a really lonesome person with lonesome feelings and accordingly was often desperate for someone to chat to. Throughout the novel Curleys wife stirred up some emotions among the workers of the ranch, such as the way she looked and acted lead other characters in the novel to see her as a tart. Curlys wife indulged in a dream which had already passed her by, leaving her with a life of empty hope.Like many young women, she aspired to stardom in films after being wrongly told that she was a natural. At first she seemed cold hearted and set herself to make trouble but then it became apparent that she was just lonely adn wanted someone to talk to and as Curley was not interested in hearing about her hope s or dreams, the only person she found willing to listen to was Lenny.

Substance misusers

Identify and act upon immediate risk of peril to substance twist nighs 1. 1 Describe the range of different substances subject to misuse and their effects There Is a whole range of different substances and they all(a) create different effects. Substances stop Into three different categories, with more than champion category fitting some substances. The three categories ar Stimulants, Depressants and Hallucinogens. I forget proceed to list the main substances, their effects, how they are taken and the category they fit into Alkyl Nitrates (poppers, amyl nitrate, butyl nitrate, gibbously nitrate) CategoryHallucinogens Effect Brief but intense run quicken, flushed face and neck, effects fade after 2-5- minutes figure and how taken Vapor which is breathed in through the mouth or nose or from a lesser bottle or tube. Amphetamines (speed, waltz, poet, belly, sulfate, quartz meet) Category Stimulants Effect Excitement, the mind races and users feel confident and energetic, supp resses appetite, smoking watch crystal meet will produce a more intense rush process and how taken Grey or discolor gunpowder that is snorted, swallowed, smoked, injected or dissolved in a drink.Base is a strong version of the powder form and is white or yellowish in color and is ordinarily swallowed or injected. Tablets which are swallowed. Crystal meet is crystalline and is smoked or injected. Anabolic Steroids (rods) Category Users say the drugs make them feel more obstreperous and able to train harder, helps build up muscle with exercise, helps users recover from bumbreaking exercise fashion model and how taken Tablets that are swallowed or liquids that are injected BGP Phenylalanine (BIZ, pep, pep love, pep twisted, pep stones, the good stuff, exodus, frenzy) CategoryCauses effects similar to amphetamine but not as strong. When combined with other types of prissiness the effects be to be compounded which gives a greater sense of euphory (effects foot differ from pill to pill due to the nature of the chemical make-up) stamp and how taken Pills many shapes, forms and color in Often have Imprints such as fly, crown, heart and can practically be sold as intensity Cannabis (Marijuana, weed, puff, skunk, blow, phonic, draw. Soapbox) Category Users feel relaxed and talkative. May puddle hilarity. ordinarily brings on cravings for food.Strong skunk can cause hallucinations. abidance and how taken A consentaneous dark lump known as resin/hash or leaves, buds, stalks and seeds, or a sticky dark oil. Can be roll either with or without tobacco in a Joint or smoked in a pipe, or eaten in a legal profession or biscuits. Cocaine and Crack (Cocaine, Charlie, coke, crack, wash, rock, white) Category Sense of well-being alert and confidence. For cocaine the effect can last for around 30 minutes, users are oft left wishing for more. Crack has the same effects as cocaine but is such(prenominal) more intense and a much shorter high with a ore in tense craving for more.Form and how taken Cocaine white powder that is snorted up the nose, dabbed on gums, swallowed and sometimes dissolved and injected. Crack small raisin sized crystals which are smoked in a pipe diacetylmorphine (smack, gear, brown, H) Depressants Strong feeling of warmth, contentment and well-being (happy bubble) Form and how taken Usually brown, sometimes white powder. Either smoked on foil or prepared for injection and injected. Ecstasy (E, doves, pills, burgers, disco biscuit, maturities, MADAM) Category Users feel alert and in tune with their surroundings.Sound, color and emotions seem more intense. Users may leap for extended periods. Effects may last for 3 to 6 hours. Form and how use Tablets of different shapes, size and color often with some liberal of logo on. Pure MADAM (the main ingredient in eagerness pills) is a brown colored crystal and is crushed and snorted. Gases, glues and aerosols (lighter gas, aerosols containing products such as hair spray, deodorants and air fresheners, tins or tubes of glue, some paints, thinners and correcting fluids) CategoryHallucinogens Similar to being real drunk, also thick headed, dizzy, giggly, dreamy, and hallucinations Form and how used Sniffed or breathed into the lungs from a cloth or sleeve. Gas products are sometimes squirted directly into the back of the throat. Alcohol Disinherited, euphoria, loss of coordination and unconsciousness Form and how usedDrunk as a liquid Astatine (K, special K, vitamin K) in severe cases Form and how used Legally produced as a liquid, illegally produced as a pill or grainy white powder usually snorted or prepared for injection ND injected.Painlessnesss (Valid, digamma, tempera, neutralize, planetarium, yellows, blues, smarmiest, bonzes, reopen, trains, Jellies, valise, mommies, roofers, downers) Long acting bonzes such as valid/digamma are commonly used for stress and anxiety management. diddle acting ones such as tempera are often used for help with sleep. Used in detoxification where there is risk of fitting. All cause a calm relaxed feeling or bring on sleep. Form and how used Either swallowed as a pill, injected or used in a suppositoryOpiates (Methadone, codeine, Dehydrogenate (DIF 18), Diction, Petitioned, Opium, Morphine, Playful, Subtext partial opiate) Category Can be divided into long acting and short acting. SHort acting can depending on dose, give feelings of contentment and relief of distress that is also offered by heroin. interminable acting opiates such as methadone cause less euphoria and are mainly used to relieve symptoms of withdrawal. Form and how used Pills swallowed, linctuses swallowed, enunciable preparations. gamma hydroxybutyrate (GHB, Liquid Ecstasy, gammahydroxybutyrate, RE, rib, blue Juice, roofless, liquid E)Small amounts may cause gaiety and distribution. Increasing amounts brings out depressant effects. Sometimes used for bodybuilding. Induces sleep and is often associated with rape. Form and how used Odorless slightly salty liquid. Concentration is protean so may be difficult to measure dosage often mixed with a drink LSI (Acid, trip, tab, blotter, stars) Time distortion, perceptual changes, visual colors and patterns Form and how used Usually a small tab of theme with a colorful pattern on usually eaten or wiped around gums

Tuesday, February 26, 2019

The Hunters: Moonsong Chapter Six

Cautiously, flavourless felt along the path with his foot until he found pastureland, then inched his way onto it, holding his give appear in front of him until he was touching the rough bark of a tree. in that respect probably werent too many people hanging around right(prenominal) the main campus gate, scarcely hed besides as soon prevail no genius see him, blindfolded, dressed in his weddings-and-funerals suit and tie, and looking, he was sure, same(p) an moron.On the other hand, he did want whoever was coming to get him to be able to spot him. It would be better to look like an idiot out in the contribute now and move part of the Vitale familiarity than to hide and spend the rest of the night blindfolded in the bushes. plane inched his way derriere toward where he thought the gate must be and stumbled. Waving his hands, he managed to catch his balance again.He suddenly wished he had told someone where he was going. What if somebody other than the Vitale associa tion had left him the crease? What if this was a plan to get him on his own, some kind of jam? vapid ran his finger beneath his sweaty too-tight col ar. After al the eldritch things that had happened to him in the last year, he couldnt help being paranoid.If he vanished now, his friends would neer know what had happened to him. He thought of Elenas laughing blue eyeball, her clear, searching gaze. She would run away him if he disappe bed, he knew, even if she had never loved him the way he wanted her to. Bonnies laugh would lose its carefree note if phlegm were gone, and Meredith would become more tense and fierce, push herself harder. He mattered to them.The Vitale Societys invitation was clear, though tel no one. If he wanted to get in the game, he had to play by their rules. vapid understood rules.Without warning, someone two someones grabbed his arms, one on each side. Instinctively, phlegm struggled, and he heard a grunt of exasperation from the person on his right. Fortis aeturnus, hissed the person on his left like a password, his breath stiff on compresseds ear.Matt halt fighting. That was the slogan on the letter from the Vitale Society, wasnt it? It was Latin, he was pretty sure. He wished hed run throughn the time to find out what it meant. He let the people holding his arms guide him across the grass and onto the road.Step up, the one on his left whispered, and Matt moved prior careful y, climbing into what seemed to be the foul of a van. Firm hands pushed his head sight to salvage him from banging it on the vans roof, and Matt was reminded of that sinful time this past summer when hed been arrested, accused of attacking Caroline. The cops had pushed his head down just like that when they put him handcuffed into the ass of the squad car. His stomach sank with remembered dread, simply he shook it off. The Guardians had erased everyones memories of Carolines false accusitions, just as theyd changed everything else.The hands cha nnelise him to a seat and strapped a seat belt around him. in that respect seemed to be people sitting on each side of him, and Matt opened his spill the beans to speak to say what, he didnt know.Be stil , the clandestine voice whispered, and Matt near(a)d his mouth obediently. He strained his eyes to see something past the blindfold, even a hint of light and shadow, but everything was dark. Footsteps clattered across the grade of the van then the doors slammed, and the engine started up.Matt sat back. He tried to keep track of the turns the van took but confounded count of the rights and lefts after a few minutes and instead just sat quietly, waiting to see what would happen nigh.After about fifteen minutes, the van came to a halt. The people on either side of Matt sat up straighter, and he tensed, too. He heard the front doors open and close and then footsteps come around the van before the back doors opened.Remain silent, the voice that spoke to him earlier ordered. You w il be guided toward the next stage of your journey.The person next to Matt brushed against him as he rose, and Matt heard him stumble on what sounded like gravel underfoot as he was led away. He listened alertly, but, once that person had left, Matt heard just the nervous shifting of the other people seat in the van. He jumped when hands took his arms once more. Somehow theyd snuck up on him again he hadnt heard a thing.The hands helped him out of the van, then guided him across what felt like a paving material or courtyard, where his shoes thudded against first gravel, then pavement. His guides continued to lead him up a series of stairs, through some kind of hal way, then back down again. Matt counted three flights down before he was stopped again.Wait here, the voice said, and then his guides stepped away.Matt tried to cast out where he was. He could hear people, probably his companions from the van, shifting quietly, but no one spoke. Judging by the echoes their illuminatet le motions produced, they were in a monumental space a gym? a basement? Probably a basement, after al those stairs down.From behind him came the quiet click of a door closing.You may now remove your blindfolds, a new voice, latterly and confident, said.Matt untied his blindfold and looked around, blinking as his eyes modify to the light. It was a faint, indirect light, which supported his basement theory, but if this was a basement, it was the fanciest one hed ever seen.The room was huge, stretching into dimness at its other end, and the floor and wal s were paneled in a dark, heavy wood. Arches and pil ars supported the capital at intervals, and at that place were some kinds of carvings on them the clever, twisted shell of what efficacy be a sprite leered at him from a pil ar the figure of a running deer spanned one archway.Red-velvet-seated chairs and heavy wooden tables run along the wal s. Matt and the others were facing a great central archway, topped by a large ornate letter V made of diverse kinds of glittering, highly polished metals elaborately welded together. Below the V ran the same guideword that had appeared on the letter fortis aeturnus.Glancing at the people near him, Matt precept that he wasnt the except one feeling confused and apprehensive.There were peradventure fifteen other people standing there, and they seemed like they came from contrastive classes there was no way that tal , stooping computed axial tomography with the ful beard was a freshman.A smal , moon-faced girl with short ringlets of brown hair caught Matts eye. She raised her eyebrows at him, widening her mouth in an exaggerated expression of bewilderment. Matt grinned back at her, his spirits lightening. He shifted closer to her and had just opened his mouth to whisper an introduction when he was interrupted.Welcome, said the deep, authoritative voice that had instructed them to take off their blindfolds, and a young man stepped up to the central archway, at on ce below the huge V. Behind him came a circle of others, seemingly a mix of guys and girls, al clothed in black and wearing masks. The exertion ought to beget been over the top, Matt thought, but instead the masked figures seemed dismal and aloof, and he suppressed a shiver.The guy beneath the arch was the only one not wearing a mask. He was a position shorter than the silent figures around him, with curly dark hair, and he smiled warmly as he stretched out his hands toward Matt and the others.Welcome, he said again, to a secret. You may have heard rumors of the Vitale Society, the oldest and most il ustrious brass instrument of Dalcrest. This is a society often spoken of in whispers, but about which no one knows the truth. No one except its members. I am Ethan Crane, the true president of the Vitale Society, and Im delighted that you have accepted our invitation. He paused and looked around. You have been invited to contract because you are the best of the best. Each of you has different strengths. He gestured to the tal , bearded guy Matt had noticed. Stuart Covington here is the most bril iant scientific mind of the senior class, perhaps one of the most promising ones in the country. His articles on biogenetics have already been published in numerous journals.Ethan walked into the crowd and stopped next to Matt.This close up, Matt could see that Ethans eyes were an almost golden hazel, ful of warmth. Matt Honeycutt enters Dalcrest as a starting player on the footbal team after atomic number 82 his high school to the state championship last year.He could have had his choice of col ege footbal programs, and he chose to come to Dalcrest. Matt ducked his head modestly, and Ethan squeezed his bring up before walking on to stop next to the cute round-faced girl.Junior Chloe Pascal is, as those of you who attended last years campus art state know, the most talented artist on campus. Her dynamic, exciting sculptures have won her the Gershner Award for t wo years running. He patted Chloe on the arm as she blushed.Ethan went on, passing from one member of their little grouping to another, listing accomplishments. Matt was only half listening as he looked around at the rapt expressions on the faces of the other candidates, but he got the impression of a wide range of talents, and that this was indeed a gathering of the best of the best, an fabrication of campus achievers. He seemed to be the only freshman.He felt like Ethan had lit a glowing candle inside him he, Matt, who had been the least special of his group of friends, was being singled out.As you can see, Ethan said, circling back to the front of the group, each of you has different skil s. Brains, creativity, athleticism, the ability to lead others. These qualities, when brought together, can make you the most elite and sizable group, not only on campus, but throughout life. The Vitale Society is an organization with a long history, and once you are a member of the society, you are one for life. Forever. He held up one finger in caution, his face serious. However, this meeting is but the first step on the road to comely a Vitale. And it is a difficult road. He smiled at them again. I weigh we believe that al of you have what it takes to become a Vitale. You would not have been invited to confidence if we did not think you were worthy.Matt straightened his shoulders and held his head high.Least extraordinary member of his group of friends or not, hed saved the world or at least his hometown more than once. Even if hed just been one of a team then, he was pretty sure he could handle whatever the Vitale Society could throw at him.Ethan smiled directly at him. If you are prepared to pledge the Vitale Society, to keep our secrets and earn our trust, step preliminary now.Without hesitating, Matt stepped forward. Chloe and the bearded guy Stuart stepped with him and, looking around, Matt saw that every one of the pledges had moved forward together. Ethan came toward Matt and took hold of the lapel of his suit. There, he said, quickly pinning something on it and allow Matt go. Wear this at al times, but discreetly.You must keep your involvement with the society secret.You wil be contacted. Congratulations. He gave Matt a brief, genuine smile, and moved on to Chloe, saying the same thing to her.Matt glum his lapel up and looked at the tiny dark blue V that Ethan had pinned to it. Hed never thought much before about fraternities, or secret societies, or any kind of organization that wasnt a sports team. But this, being the only freshman the legendary Vitale Society wanted, was different. They saw something in him, something special.

Middle Childhood and Adolescences

Human harvest-home development theory is an organized statement of values and generalization that provides an synopsis for understanding how and why people change as they rise from foil to maturity date. Theorist tries to make nose out out of observations and construct a drool of the valet de chambre journey from infancy through childhood or adulthood (P. H. Miller, 2002, p. 2). The theories link proofs with patterns, merging the details of life into a meaningful end picture of human growth development. Freud and Erickson state that human beings, starting at infancy through adulthood pass a series of psychosexual and psychosocial decimal points of development.The full stops that will be discussed will be a combination of Freud and Erickson oral, line vs. role of confusion, and phallic stages. There ar six stages that Freud elaborated on but the commencement six years occurs in three stages for each star characterized by psychosexual pleasure center on difference separ ate of the proboscis. However, Eriksons stages differ significantly from Freuds in that they emphasize family and culture, non sexual urges. He called his theory epigenetic, partly to tenseness that the expression of genes, as of biological impulses, is powerfully influenced by the social environment (Berger, p. 9, 2010). consort to, Freud during the first stage of temper development with is the oral stage from birth to superstar year, the infants tongue, and gums are the focus of pleasurable sensations in the babys body, sucking, and feeding are the just about stimulating actives. The mouth is an essential source for feeding and eating. In addition this allows the infant to develop delight with pleasure from oral stimulation through activities such(prenominal) as mouthful and sucking. Therefore, the infant is completely dependent on its parent or guardian that is responsible for feeding and nurturing the infant.Freud also stated that the oral stimulation could champion to oral dependencies later in life. For example oral personalities such as thumb sucking, nail biting, and smoking. These behaviors are exhibit when an individual is under stress (McLeod, S. A. 2008). Phallic Stage is another stage of human growth development. According to, Freud this stage starts at three though six years of age. This stage is when children become assured of their body organs. In additional, adolescences are also aware of their parents and other children that are around them. This pleasure switches between the oral nd anal stage to the phallic stage. The pleasure is not emphasized on the genitals. Freud has stated that the male develops an unconscious proclivity for the mother. Therefore, the male become in conflict with the adult male or caregiver seeing him as competition for the mother affection. This fixation gives the male an Oedipus complex, which is Freud psychoanalytic theory. This theory is the desire for sexual involvement with parent of opposite sex and a sense of rivalry with the parent of the same sex a crucial stage in the normal developmental process.Girls have been known to have an liking for their begetter. This is known as the Electra Complex, but Freud besottedly disagreed with this theory (Britannica. com). According to Freud, because strong competition with the male figures the male eventually decide to rate with the father rather than come in conflict with him. Because of this the boy develops masculine characteristics and identifies himself as a male, and represses his sexual feelings toward his mother. A fixation at this stage could leave behind in unacceptable sexual behavior and confused sexual identity according to psychoanalysts (McLeod, S.A. 2008). Identity vs. role confusion is the Erikson six stage of human development. This stage takes place between the ages of 13-18. This is an important stage of development for adolescence because this is the alteration from childhood to adulthood. Adolescents try to f igure out who am I? They crap sexual, political, and vocational identities or are confused about what role to quicken (Berger, p. 19). This stage of human development allows the childish to identify what role he will occupy as an adult.In this role the teenagers will re-examine his identify to try to figure out Who am I? Erickson suggests that two identities are involved. These identities involve the sexual an occupational. According to (Bee, 1992) at the end of this stage a reintegrate sense of self, or what one wants to do or be, and of ones appropriate sex role. During the six stages the body image of the adolescent began to change. This stages is also were the adolescent start to feel uncomfortable about their body for a while until they can adapt and change into their new image.Based upon the egress of their adapting the adolescent can start to begin to form their own identity. Nevertheless, the adolescent can also start to become confuse about themselves, such as what is their place in the world and what they want to be when that grow up. In evaluating Freud Erikson human development theories it has been learned that both saw personality developing throughout a lifecycle of each individual. Each looks at and place the crises at each stage in development.In addition difference psychologist call back that different phases are more important than other phases, but what most psychologist do agree on it that one stage leads to the next stage. root Berger, K. , & S, . (2010). Invitation of the life span. Retrieved from The University of Phoenix eBook Collection database. McLeod, S. A. (2008). Psychosexual Stages Retrieve from simplypsychology. org/psychosexual from http//www. simplypsychology. org/psychosexual. hypertext mark-up language Bee, H. L. (1992). The developing child. London HarperCollins. www. britannica. com

Monday, February 25, 2019

ï»Â¿The Role of Information Technology in Education Essay

The purpose of Information technical schoolnology in procreation explores the potential for applied science to redefine the terms of pedagogy and learning. Can the similarlyls of applied science break through the barriers to cultureal progress? What inhibits the effective use of engine room? What are the perceived and the real limits of these tools? Thirteen grantees are suspensoring to manage these questions. In 1998, we noticed that computers in disseverrooms, frequently donated by well-intentioned companies, too often sat idle, or if used, amounted to little more than enhanced typewriters. do computers available in schools was not sufficient to realizing technologys potential. The Role of Information Technology in Education initiative explores factors necessary to encourage technology reach its potential for learning. From the public school to the university setting, from local anesthetic communities to nonprofit organization organizations, these grantees each offer a unique perspective on the mathematical function of technology in education. To learn how technology is one of the many tools that lavatory educate and inculcate employees, visit Pioneer Employers.Early AssumptionsThe Hitachi Foundation issued the Tech Ed Letter based on these ideas 1. A vast legal age of schools render the equipment. crops, districts, and states seem to have found money for hardware, but have invested only meagerly, if at all, in pedagogy instructors to use the technology. 2. The education domain has no systemic approach to upgrading the skills of its professionals in both pre-collegiate and higher education. If through with(p) at all, in-service technology training for teachers has been limited in number served and scope, traditionalistic in its delivery (typically one-time sessions), or left primarily to individual teacher initiative. Training typically has not helped teachers understand how to desegregate technology into the plan. 3. there are poc kets of innovation. Individual teachers, students, and communities are delivering specific advances at every educational level. approach shots butt be grouped into 5 categories pedagogy enhanced talent for orientateing instruction for individual students and monitoring student performance to valuate instruction efficacy. constructing local fill through quislingism made executable by technology, students or professors inseveral locations, drawing on local content can transform classroom practices. professional using education technology makes possible high-quality professional development at times expedient for the teacher.Technology can overcome school scheduling problems by delivering training during off-hours or as the teacher works with students and colleagues in the classroom. collaborationism teachers and students can collaborate outside the classroom in synchronous (real-time) and asynchronous (delayed response) fora, which brings faraway more resources, perspectiv es, and analysis to classroom assignments. economic efficiency schools and universities are determination ways to use technology creatively to save money or expand productivity.4. Technology is a tool a means quite than an end.5. Using technology effectively in the classroom means transforming the classroom, teaching, and learning. creative use of technology does not mean using it solely to help slow students catch up, to occupy quick achievers, to reward good behavior, or to baby-sit. Where technology is yielding results, the classrooms are student-centered, with teachers as coaches and guides. Outside resources come to class and students go outside the classroom. Technology allows engagement, review, and especially estimate in broader, deeper ways.Portfolio GoalsIn addition to each trade union movements individual goals, we had these broad goals for the portfolio illustrate how technology is being used to make possible new(a) methods, outcomes, and advancements in teaching and learning. Illustrate specifically how teaching technologies can improve or advance teaching or learning, and for whom. Identify unused or unknown opportunities to strengthen teaching and learning through the use of information technology. Advance the practice of collaboration.Document and disseminate program models.GranteesCalifornia say University Dominguez Hills, Carson, CAThis project is creating interactive Web Site teaching applications for K-12 teachers in the forbidding/Carson Cluster (Los Angeles integrated School District). teachers will be able to tailor self-paced and class-wideinstruction, develop and revise the applications, monitor and evaluate their approaches and student performance on specific subjects and problems, give up students with individual problem sets, and collaborate with other teachers. Catholic University of America, Washington, DC International practical(prenominal) Department for diachronic Studies of Mathematics The Catholic University of America, in partnership with the Mathematical Association of America and numerous scholars at universities worldwide (including Oxford, Russian Academy of Sciences, Princeton, and Kyoto), is implementing, evaluating, and disseminating an International Virtual Department for Historical Studies of Mathematics.The Childrens Museum, Boston, MA Teacher-to-Teacher On-Line The Childrens Museum The Childrens Museums Teacher Center is creating Teacher-to-Teacher On-Line The Childrens Museum, a training and discussion assembly for mere(a) teachers to exchange activities, ideas, and curriculum as the state institutes new curriculum frameworks. Delaware Education Research and Development Center, University of Delaware, Newark, DE First-State Instructional Resource System for Teachers (FIRST)This project is establishing, testing, and refining the First-State Instructional Resource System for Teachers. FIRST is an Internet-based professional development system linked to Delawares state educa tion reform movement. The settle will include professional development units that illustrate effective teaching of curriculum concepts, curriculum units linked to state standards, teacher discussion and collaboration forums, teacher comments on curriculum units, related commercial curriculum resources, and assessment techniques. double birdie Rock Junior/Senior High School, Los Angeles, CAThe Eagle Rock Junior/Senior High School started The Talons 2000 Academy a four-spot- yr, college preparatory program with a focus on business and technology. The Academy, indoors the walls of ERJ/SHS, is developing a student-led business to build, refurbish, and support computers throughout ERJ/SHS, the LA Unified School District, and the familiarity. Information and Referral/Volunteer Connection, Coeur dAlene, ID Community Science Online uses information technology to teach science by integrating scientific content with local and regional history and discussions of contemporary events in an interactive Multi-Object-Oriented environment. Leadership,Education, and sportsman in Partnership, New Haven, CT LEAP Computer encyclopedism Centers Leadership, Education, and mutant in Partnership, in conjunction with the Hartford and New Haven lodgment Authorities, Yale University, and Connecticut College is creating parent and student outreach programs in LEAP Computer Learning Centers in three CT cities. LEAP is evaluating the impact of the centers programs on small fry development and technology skill building and increasing the breadth of technology training for LEAP parents and schools.New York Institute of Technology, Central Islip, NY Educational opening Zone The New York Institute of Technology, in partnership with the Nassau and Dutchess County board of Cooperative Educational Services and seven museums is creating an Educational Enterprise Zone. united by low bandwidth videoconferencing and a host of other technological tools, museums, libraries, teacher cente rs, and others will beam their knowledge into schools. Northwest Arctic Borough School District, Kotzebue, AK The Virtual Village Northwest Arctic Borough is creating The Virtual Village project to train student technology leaders to be mentors to teachers, students, and staff in enunciate to help teachers incorporate modern technology so students can come to and spread traditional cultural knowledge. The project addresses challenges and opportunities that include a evanescent teaching pool, isolated villages accessible only by air, and curriculum satisfying that is not linked to village realities or traditional knowledge and ways. Scott alley Elementary School, Santa Clara, CA 1000 Days to Success in education Scott Lane Elementary School is adding technology as it starts the second year of its 1000 Days to Success in Reading project a warranty program that guarantees all children who entered kindergarten in September 1997 will be reading at or above grade level by the end of second grade.The project is training teachers to use technology and integrate it into the curriculum, establish a cyber-space library, allow broader interactions among teachers to expand their resources and support services, and engage parents, community of interests volunteers, and the larger school population in the educational process. Tucson Unified School District, Tucson, AZ Community Learning Project The Tucson Unified School District, in collaboration with The University of Arizona, is implementing the Community Learning Project at two elementary schools. The project will coordinate three existing pilot programs toprovide a comprehensive, experiential, interdisciplinary education experience for children and their university mentors. Virginia Polytechnic Institute and State University, Blacksburg, VA Facilitating the Community as a Learning Community The Facilitating the Community as a Learning Community project expands and improves the Blacksburg Electronic Village com munity network and its links to K-12 education and community interaction with a new Web-based multi-user domain.The project will develop, implement, and investigate educational activities that involve real-time collaboration with community members and activities that engage citizens on matters of community interest. World Game Institute, Philadelphia, PA NetWorld Game Learning Project The World Game Institute (WGI) and four collaborating museums are supporting the NetWorld Game Learning Project -a comprehensive Internet-based education program for high school teachers and students. The NetWorld Game Learning Project creates an Internet-based example of real world situations that complements high school curricula in four U.S. cities.University of okeh Colleges of applied science and Education, in partnership with the State Department of Education, Norman, OK The Colleges of Engineering and Education, in partnership with the Oklahoma State Department of Education, is creating an In ternet-based training program to instruct teachers how to incorporate electronic media into their classrooms. Teachers learn how to develop and use graphics, animation, simulation, aloofness learning, network-based collaboration, online courseware, and streaming video to both amplify their teaching style and get down students into the constantly changing world of technology.

Counter-Productive Behavior Indexâ„¢

Counter-Productive Behavior Index Every single sidereal day employees dont show for discipline, steal cash and inventory, surf the web, e-mail on fellowship time, and disrupt the workplace. It is burning up billions of dollars of profits and inventory each and all year. The Counter-Productive Behavior Index (CBI) is a contemporary integrity test a cost-effective screening procedure for finding job appli provokets whose conduct, attitudes, and work-related values are presumable to interfere with their success as employees.The CBI consists of an objective questionnaire with 140 true/ paradoxical items that can be completed by the job applicant in about 15 minutes. CBI is a self-scoring assessment available in both(prenominal) English and Spanish. The candidate completes a questionnaire which is then agreed within seconds by the hiring manager or assistant. A managers interview question guide is available. (Free with the first purchase). raw(a) An online version called Candid Clues is available too.Candid Clues generates an objective report addressing grad of potential concern about the six major areas identified below, a measure of overall or total concern, and an assessment of self-serving answer bias. Counter-Productive Behavior Index is the most cost-effective pre-employment screening test to identify spirited-risk and disruptive work-related attitudes and behaviors Employee Dependability Honesty Substance Abuse calculator Abuse Workplace Aggression Sexual Harassment CBI is the perfect beginning for all size businesses.Saves time and money. How CBI Works The basic meaning of the score are as follows Dependability Concerns. Low scorers are dependable, conscientious, and reliable. High scorers can be undependable, careless, lazy, and disorganized. Aggression Concerns. Low scorers handle their feelings well and are flimsy to be disruptive. High scorers can be aggressive, hostile, disruptive, and have poor program line of their anger. Substance Abuse Concerns. Low scorers have no problems with alcohol and/or illegal drugs.High scorers report substantial use of alcohol and/or illegal drugs and may be disruptive. Honesty Concerns. Low scorers have no problem with workplace dishonesty. High scorers have the potential for dishonest behavior in the workplace. Computer Abuse Concerns. Low scorers use their workplace computers yet for work-related uses. High scorers use their computers in ways that are unrelated to their work activities or are disruptive to their work. Sexual Harassment Concerns. Low scads are unlikely to engage in sexual harassment at work.High scorers have attitudes and behaviors regarding sexuality that are likely to be considered as harassment by the opposite sex. overall Concerns. Low scorers report a few(prenominal) instances of workplace deviance. High scorers report a wide range of abnormal behaviors in the workplace and are likely to be problematic employees. (The Overall Concerns score is included in order to help identify applicants whose private get over scores might all fall below the shimmy score for inclusion in the Concern category, but whose total score does identify them as worthy of special attention.It is important to note that high Overall scores still require a close testing of the six individual scale scores. ) Good Impression. Low scorers are diffuse about acknowledging their normal faults and imperfections. High scorers deny normal shortcomings and exaggerate individualized virtues, suggesting that their scores on the other scales may be artificially down in the mouth by their efforts to make a good impression. Scores on this scale can be used to determine the degree of confidence that should be placed in the remainder of the profile.

Sunday, February 24, 2019

E-Ticket

INDEX 1. ACKNOWLEDGEMENT 2. FEASIBILITY STUDY a) ABSTRACT b) difficulty STATEMENT c) FORMULATION OF SOLUTION STRATEGIES and d) analytic thinking OF ALTERNATE SOLUTIONS 3. REQUIREMENT ANALYSIS a) HARDWARE AND SOFTWARE REQUIREMENTS b) SRS DOCUMENT i. SOFTWARE MODEL ii. ARCHITECTURAL drill iii. DESIGN PATTERN iv. SCOPE AND cargon for v. OUTLINE OF ANALYZED PROCESSES 4. dust DESIGN a) PROJECT SYNOPSIS b) ER-DIAGRAMS c) UML DIAGRAMS i. USECASE DIAGRAMS ii. CLASS DIAGRAMS iii. SEQUENCE DIAGRAMS d) DATABASE DESIGN 5. victuals 6. destruction 7. BIBLIOGRAPHY ABSTRACT ? Name of the Project e-Ticketing Vision The Ultimate slogan of the swan addresses in in all the problems that were faced by the current prompting agencies. approaching to the feasibility aspect the current fuddle focuses on 1) Economical feasibleness 2) Technical Feasibility 3) Operational Feasibility ? Deliver adequate to(p)s/ Functional Specification- 1. un metre-tested Administrators 2. Current elements 3. customers 4. lucubrate of the run. 5. Timings, Source, laste elaborate. Note The finish should be secured with dissimilar levels of approach path control. INITIAL INVESTIGATION Project Request and Problem initializationThe foil-go step in System Development Life Cycle (SDLC) is the acknowledgement of fate. The user request identifies the need for sort and authorizes the initial investigation. The objective is to influence whether the request is valid and feasible. The come forwardcome of the initial investigation is the pre directation of results called compute proposal. An acceptance signature on the project proposal by the sure person and its acceptance by the MIS department makes it a formal harmony to proceed with the detailed analysis and target of the bottomlanddi ascertain trunk. PROBLEM interpretationThis project is basically about the e-Ticketing for xxxxxxxxxx. The existing procedure of e-Ticketing was d ace locally individual to the travelling ag ency, looking up and checking the respective(a) enlarge of divergent services in diametric places was a muffled and cumber whatsoever process. It was howevering error pr ace and definitely non a pleasant to a lower placetaking to perform. There atomic number 18 many problems involved in the existing musical arrangement and has the following limitations- Time consuming ( entirely process was done involving manually). Lack of integration. impediment in entropy processing (Since for each conviction the customer has to manually involve). Changing the decision at the last moment is a tedious task. Difficulty in haveing the service inside information. These were the chief reasons for the knowledge of the project. To unbosom the above lacuna and hence achieving better information retrieval, the make-up has unflinching to introduce the use of e-Ticketing FORMULATION OF SOLUTION STRATEGIES AND ANALYSIS OF ALTERNATE SOLUTIONS Organizations at once spate be benefit f rom the availability of these alternatives and evaluate how they weed scoop benefit from them in the short to long term. Full treasury primevalisation is today to a greater extent gravelible than ever.The traditional primevalizing structures atomic number 18 salve the preferred options, nevertheless payment factories atomic number 18 becoming more detailed as the integration grade amidst treasury and the rest of the organization. Furthermore, strategical outsourcing is lowering the investment and project risk barriers and can significantly foreshorten the execution time of a centralisation initiative if not level leap-frog some of the intermediate phases. While organizational centralization is a creation that is well understood, its practical lotion faces many challenges that much lead to a slow progression towards climby centralized centering homunculuss.Transition can exact varied forms and can proceed at contrastive speeds depending on the corporate orga nization. Individual patronage as well as form-wide initiatives, driven by cost efficiency, process integration or performance visibility, generate raw(a) centralization-fostering opportunities The use of reference to centralization terminology requires some qualifications Strategic coordination the little intrusive form, relying on policies, procedures and guidelines centrally issued. Compliance control ground on a formal and strict compliance and reporting framework, which could extend to central approval for certain activities Mandated execution involving the transfer of some value-adding activities to a central entity Functional consolidation migration and reorganization of entire activities into a saucily fundament Over the past decade functional centralization has experienced a strong acceleration thanks to rapid informations in application apply science and communication protocols.By breaking down some of the barriers to effective ex limiting, rise to power a nd circulation of selective information and information, the functional distribution of tasks and activities can be designed in a more tractile manner. mountaininess applications can be deployed as whizz global installations and openinged remotely and securely. They can interface more easily with some some different organizations and integrate a subjugate of independent or standalone processes. The combination of these features takes centralization to a invigorated level of sophistication and at the same time makes it more accessible and appropriate to a broader number of organizations.While organizational centralization is a concept that is well understood, its practical application faces many challenges that often lead to a slow progression towards amply centralized management rides. Transition can take different forms and can proceed at different speeds, depending on the corporate organization. Centralization is commonly associated with a number of strong benefits tha t range from pure cost savings to control amendment, full compliance with corporate policies, process modularization, increased intersectionivity and expertise consolidation. ironware and software program Requirements User interface necessitys Dreamweaver MX.IDE Eclipse Database requirements Oracle8. 1 Server tom turkey 5. 0 Preferred Technologies umberScript, coffee bean ( Jdbc 2. 0,Servlets2. 1, JSP 1. 2 ,Struts) SOFTWARE DEVELOPMENT PROCESS MODEL In this project we are victimization the Evolutionary role illustration which is as well referred to as the triumphive versions model and sometimes as the incremental model. Comparison of different invigoration cycle models Although classical waterfall model is the basic model for all the other life cycle models but it cannot be utilize in practical ontogeny projects, since these models supports no mechanics to spread over the errors during the phases.This problem is overcome in iterative waterfall model but it is not suitable for very large projects and for projects that are landing field to many risks. This model assumes that the requirements be unloadly specified sooner the beside of the development activity can project, it cannot be satisfactorily used in projects where only rough requirements are obtainable at the beginning of the project. This model creates blocking states in the remains i. e. , some team members would have to tarry for a phase to be complete before they can blow up their next activity. This is clearly wastage of re etymons and such(prenominal) wastages are rarely tolerated in real projects.In this life cycle model, the software is prototypic broken down into several(prenominal) models (or) functional units, which can be incrementally constructed and delivered. The development team frontmost develops the affection staffs of the arranging. This initial harvest-tide skeleton is refined into increasing levels of capability by adding naked functionalities in achieverive versions. to each one evolutionary version whitethorn be real exploitation an iterative waterfall model of development. Each successive version of the product is fully functioning software dependent of performing more useful work than the previous versions.In this model, the user gets a chance to experiment with partially demonstrable software much before the complete version of the schema is released. Therefore, the evolutionary model helps to accurately pull user requirements during the lecture of the different versions of the software, and the change requests therefore after delivery of the complete software are minimized. Also the core modules get tested thoroughly, thereby reducing chances of errors in the core modules of the final product. Further, this model obviates the need to commit large re witnessers in one go for development of the system.The principal(prenominal) disadvantage of the successive versions model is that for most practical problems it i s difficult to catchment area the problem into several functional units, which can be incrementally utilize and delivered. Therefore, the evolutionary model is normally useful for only very large products, where it is easier to pass modules for incremental executing. Often the evolutionary model is especially when the customer prefers to throw the product in increments to be able to start using the different features as and when they are developed rather than waiting for the full product to be developed and delivered.Evolutionary model is very popular for the object-oriented software development projects, because the system can easily be partitioned into stand-alone units in term of the objects. ARCHITECTURAL PATTERN framework- soak up- dominance The theoretical posting Layer The model layer in a coffee tree based electronic network application can be implemented using any Java-based technology, such as EJB, Hibernate, or JDO. In our CoreBanking System. The model is repre sented as simple JavaBeans containing the information and muckleiness logical system in a simple information access object. As cold as potential, the model objects should be developed so that they have no knowledge of the environment.This allows us to more easily reuse them across environments and applications. The discern Layer The count on layer of most Java based web applications is made up of JavaServer pageboys. To facilitate the development of the prospect, Java provides a fictional characterset of JSP tag libraries. These tag libraries allow us to easily provide fully internationalised user interfaces that interact with the model components of a web application. The vast studyity of dynamic Web front ends are based on hypertext mark-up spoken communication forms, and users of such applications have come to expect from these applications certain behaviours, such as form validation.With ensample JSP, this is a tedious process that involves recording the confine of the form and populating each form element with information from a JavaBean in case of error. Java facilitates this sort of form processing and validation using Custom tags. These, in combination with the JSP tag libraries, make shot development with forms really simple and subjective. The Controller Layer Java allows a Servlet that implements the base functions of the Controller, which is to map the incoming URL to a model object. The Servlet provides the following functions 1.Decide what transaction is required to service a users request 2. Provide interpret info to the sketch 3. Decide which view to show next A Java developer must provide these actions (models) to implement the logic of their application. What is Model- slang-Controller? . Lets start by looking at how the Model, the suppose, and the Controller interact with one another(prenominal)(prenominal) pic Figure 1 Model 2/MVC architecture As you can see from the above diagram, the user interacts with the Cont roller components (usually represented by Servlets) by submitting requests to them.In turn, the Controller components instantiate Model components (usually represented by JavaBeans or other similar technology), and garble them match to the logic of the application. Once the Model is constructed, the Controller decides which place (usually represented by JavaServer Pages) to show to the user next, and this weigh interacts with the Model to show the relevant entropy to the user. Using Java Server Pages or Servlets alone is known as Model 1. Model 2 was not particularly innovative or new it uses Servlets to resemble Controller and Java ServerPages for resembling views.Many people realised that it follows the well-known MVC pattern that was developed back in the days of Smalltalk. As such, Java platformmers tend to use the terms Model 2 and MVC interchangeably. DESIGN PATTERN Data Access fair game circumstance Access to data varies depending on the source of the data. Access t o opinionated storage, such as to a database, varies greatly depending on the type of storage (relational databases, object-oriented databases, straight off files, and so forth) and the vendor executing Problem Applications can use the JDBC API to access data residing in a relational database management system (RDBMS).The JDBC API enables standard access and manipulation of data in persistent storage, such as a relational database. The JDBC API enables J2EE applications to use SQL statements, which are the standard instrument for accessing RDBMS tables. However, yet within an RDBMS environment, the actual syntax and format of the SQL statements whitethorn vary depending on the particular database product. There is even greater variation with different types of persistent storage. Access mechanisms, supported APIs, and features vary between different types of persistent hold ons such as RDBMS, object-oriented databases, flat files, and so forth. such disparate data sources off er challenges to the application and can potentially create a direct dependency between application code and data access code. When great dealiness components-entity beans, session beans, and even presentation components a similar(p) servlets and helper objects for Java Server Pages (JSP) pages need to access a data source, they can use the appropriate API to achieve connectivity and manipulate the data source. But including the connectivity and data access code within these components introduces a tight coupling between the components and the data source implementation.Such code dependencies in components make it difficult and tedious to migrate the application from one type of data source to another. When the data source changes, the components need to be changed to cut through the new type of data source. Forces Portability of the components is directly affected when limited access mechanisms and APIs are included in the components. Components need to be cobwebby to the actu al persistent store or data source implementation to provide easy migration to different vendor products, different storage types, and different data source types. SolutionUse a Data Access Object (DAO) to get up and encapsulate all access to the data source. The DAO manages the connection with the data source to obtain and store data. The DAO implements the access mechanism required to work with the data source. The data source could be a persistent store equal an RDBMS, an external service akin a B2B exchange, a repository like an LDAP database, or a business service accessed via CORBA Internet Inter-ORB Protocol (IIOP) or low-level sockets. The business component that relies on the DAO uses the simpler interface heart-to-heart by the DAO for its clients.The DAO completely hides the data source implementation details from its clients. Because the interface exposed by the DAO to clients does not change when the profound data source implementation changes, this pattern allows t he DAO to adapt to different storage schemes without affecting its clients or business components. Essentially, the DAO acts as an adapter between the component and the data source. Participants and Responsibilities sightiness Object The Business Object represents the data client. It is the object that requires access to the data source to obtain and store data.A Business Object may be implemented as a session bean, entity bean, or some other Java object, in addition to a servlet or helper bean that accesses the data source. Data Access Object The DataAccessObject is the primary object of this pattern. The DataAccessObject abstracts the underlying data access implementation for the Business Object to enable filmy access to the data source. The Business Object overly delegates data load and store operations to the DataAccessObject. direct Object This represents a Transfer Object used as a data carrier. The DataAccessObject may use a Transfer Object to return data to the client.Th e DataAccessObject may also receive the data from the client in a Transfer Object to update the data in the data source. Consequences Enables Transparency Business objects can use the data source without knowing the specific details of the data sources implementation. Access is transparent because the implementation details are hidden inside the DAO. Enables Easier Migration A layer of DAOs makes it easier for an application to migrate to a different database implementation. The business objects have no knowledge of the underlying data implementation. Thus, the migration involves changes only to the DAO layer.Further, if employing a factory strategy, it is possible to provide a concrete factory implementation for each underlying storage implementation. In this case, migrating to a different storage implementation means providing a new factory implementation to the application. Reduces Code Complexity in Business Objects Because the DAOs manage all the data access complexities, it simplifies the code in the business objects and other data clients that use the DAOs. All implementation-related code (such as SQL statements) is contained in the DAO and not in the business object.This improves code readability and development productivity. Centralizes All Data Access into a Separate Layer Because all data access operations are now delegated to the DAOs, the separate data access layer can be viewed as the layer that can isolate the rest of the application from the data access implementation. This centralization makes the application easier to curb and manage. Scope of the Development Project Database Tier The concentration is applied by adopting the Oracle 8. 1 Enterprise versions. SQL is taken as the standard query language.The overall business rules are designed by using the power of PL/SQL components like stored procedures stored functions and database triggers. User Tier The use interface is developed is a browser specific environment to have centralized arch itecture. The components are designed using Dreamweaver and Java server pages power the dynamic of the page design. Data Base Connectivity Tier The communication architecture is designed by concentrated on the standards of servlets and Java Beans. The database connectivity is established using the Java Database connectivity. PurposeThe generated application is the first version upon the system. The overall system is planned to be in the formal of distributed architecture with homogeneous database platform. The major objective of the overall system is to keep the following components intact. ( System consistency ( System integrity ( overall security of data ( Data reliability and Accuracy ( User neighbourly name both at administration and user levels ( Considering the fact of generalisation and clarity ( To cross check that the system overcomes the hurdles of the version specific standards OUTLINE OF ANALYZED PROCESSES factor ADMIN process1 adaptation of new Administrator gossip Enter all the admin details like first name, last name, date of birth etc. sue adjustment (form) return registration success/ registration move ? touch2 View pending Agents remark All the pending Agents plow view unfinished Agents (form) takings Accept/Reject bear on3 View indissoluble Agents stimulation All the long-lived Agents handle view all the unchangeable Agent Details output success/ croak ? serve well 4 lend oneself a new Bus excitant Enter Number, grammatical case, Source, and Destination swear out ply the details in the database rig success/fail summons 5 affix a new Bus Type excitant BusType, Id work on Insertion of new Type (Id. ) getup success/fail ? Process 6 Add Offer gossip OfferName, relevant for, time. Process adding Offer (form) production success/fail ? Process 7 Add New start out Details comment Enter all the start out details like Tripid, Locationid, etc. Process New Trip (form) Output success / fail ? Process8 Change Halts infix Enter existing source, destination details of the Location Process change Halts (form) Output success/fail ? Process9 spread essences To punctuate Board enter Enter Description of the Topic, Applicable toProcess sendMessages(adform) Output success ? Process10 localize Mails Input Agents Id, Customer Id Process send mails (form) Output success ? Process11 Create new group Input Enter grid and name of the group Process insertGroupDetails (GroupDetailsForm gdf) Output success ? Process12 View all the Buses Input View All Process get all the details from Database carry over Output success/fail ? Process13 View Offers Input View Offers, Time they give be elapsed. Process view Offers (table) Output success ? Process14 view indissoluble Agents Input view all the existing standing(prenominal) AgentsProcess all the long-lived Agents (table) Output success ? Process15 view contentednesss Input view All the messages that r sent by Agents, Customers Process view Messages (table ) Output success ? Process16 view Buses Input view all the existing Buses Process view Buses(table) Output success ? Process17 View TripDetails Input view All the TripDetails Process Get all the trip details like(Trip Id,Timings.. ) Output success ? Process18 view BusTypes Input view all the existing BusTypes Process View BusTypes(table) Output success ACTOR AGENT ? Process1 RegistrationInput Enter all the Agentdetails like first name, last name, date of birth etc. Process registration (form) Output registration success/ registration fail ? Process2 View Pending Agents Input All the Pending Agents Process view Pending Agents (form) Output Accept/Reject ? Process3 View Permanent Agents Input All the Permanent Agents Process view all the long-lived AgentDetails Output success/fail ? Process 4 Add a new Bus Input Enter Number, Type, Source, and Destination. Process Add the details in the database Output success/fail ? Process 5 Add a new BusType Input BusType, Id,Process Insertion of new Type (Id. ) Output success/fail ? Process 6 AddOffer Input OfferName, Applicable for,time.. Process adding Offer (form) Output success/fail ? Process 7 Add New TripDetails Input Enter all the tripdetails like Tripid, Locationid, etc. Process NewTrip(form) Output success / fail ? Process8 Change Halts Input Enter existing source, destination details of the Location Process change Halts (form) Output success/fail ? Process9 project Messages To NoticeBoard Input Enter Description of the Topic,Applicable to Process sendMessages(adform) Output success Process10 SendMails Input AgentsId, CustomerId Process send mails(form) Output success ? Process11 Creat new group Input Enter gid and name of the group Process insertGroupDetails (GroupDetailsForm gdf) Output success ? Process12 View all the Buses Input View All Process get all the details from Database add-in Output success/fail ACTOR CUSTOMER ? Process1 Registration of new Administrator Input Enter all the admindetails like first n ame, last name, date of birth etc. Process registration (form) Output registration success/ registration fail ? Process2 View Pending AgentsInput All the Pending Agents Process view Pending Agents(form) Output Accept/Reject ? Process3 View Permanent Agents Input All the Permanent Agents Process view all the permanent Agent Details Output success/fail ? Process 4 Add a new Bus Input Enter Number, Type, Source, and Destination. Process Add the details in the database Output success/fail ? Process 5 Add a new Bus Type Input BusType, Id, Process Insertion of new Type (Id. ) Output success/fail ? Process 6 AddOffer Input OfferName, Applicable for, time. Process adding Offer (form) Output success/fail Process 7 Add New TripDetails Input Enter all the trip details like Tripid, Locationid, etc. Process New Trip (form) Output success / fail Project schema Technical Descriptions ? Database The total number of databases that were identified to build the system is 14. The major parts of the da tabases are categorized as administration components and customer of based components. The administration components are useful is managing the actual master data that may be necessary to maintain the consistency of the system. These databases purely used for the midland organizational necessarily and necessities.The Administrator, Agent and Customer components are designed to handle to transactional states that arise upon the system whereas customer makes a visit onto the portal for qualification his transactions faster. The Customer components are scheduled accept parametrical information from the users as per the system necessity. ? graphical user interface In the flexibility of the users the interface has been developed a graphics concept in mind, associated through a browsers interface. The GUIS at the top level have been categorized as ? judicature users interface ? Agents interface ? Customer users interfaceThe Administration users interface concentrate on the consistent in that is practically part of organizational actuaries and which inevitably right(a) authentication for data collation. The Administrator and Agent user interface helps the respective actors in transacting with the actual information as per their necessities with specific to the required services. The GUIs restrict the ordinary users from mismanipulating the systems data, which can make the existing system non-operational. The information with specific to their personal standards and strategies can be changed through proper franchises. Modules ) Administrator Module This module maintains the services related to system executive director who is authenticated upon the system. This module fairly maintains the integration between the modules related to backend database and the functionalities carried out in the whole organization. This module also binds itself with the ingredient and customer details. 2) Agent Module This module maintains the information related to the customers who have been signed upon to the system as well as the internal information of the organization. The module integrates itself with the other modules like the Administrator module and customer module that are provided y the organization. This module acts as a major integrator with Admin transactions and the requests for approvals that are raised by the customer. 3) Customer Module This module manages and keeps track of the details of the existing services. It has interaction to Agent as well as executive to keep track of the consistency of information form time to time as they are executed. 1. Actor Admin The Admin module consists of the following services ? autobiography another administrator. ? View pending federal factors and Accept or Reject them ? View permanent agentive roles ? Add a new Bus. ? Add New Bus Type ? Add Offer Add New Trip Details ? Change Halts ? Send Messages to notice Board ? Send Mails ? View All the Busses ? View All Administrators ? View Offers ? View Per manent Agents ? View Messages ? View Busses ? View Trip details ? View Bus Types depict another administrator In this process, Admin submits the details of another administrator with whom he requisite to share his responsibilities. The person whom admin appoints as an administrator will have the privilege to do all the responsibilities that are performed by actual Admin only if he is properly authenticated after login. View pending agents and Accept or Reject themIn this process, he can view the pending agents, he may accept the agents or reject. The agents who r accepted will be treated as Permanent agents. Those who are rejected, their details will not be updated in the database. ViewPermanentAgents In this process he can view all the permanent agents along with their complete details. And the details of new Agents which he made from pending to permanent agents. Add New Bus In this process, if the existing services are not able to meet the requirements of customers, he may a dd new types to meet the requirements of customer. Add New Bus Type In this process, if the existing services are not able to meet the requirements of customers, he may add new types to meet the requirements of customer. Add Offer In this process, a strategy of new offers will be declared by admin to attract customers, and increase his business and thereby withstanding in the competition. Add New Trip Details In this process, new trip details will be declared by admin as per the agent & customer requirements. By modifying the trip details according to customer and agent requirements they may feel convenient. Change HaltsIn this process, admin can change the halts of his buses according to the Requirement of customers and also the agents keeping in view of appropriate halts and timings. Send Messages to notice Board In this process, admin can display the messages about the bus services, timings, charges, offers, trips, also the details of performance appraisal of his employees to motivate them. Send Mails In this process, admin can send the messages about the queries that were posted by both agent and customer. A proper feedback must be there for every organization to withstand the competition and to be interactive with customers. View All Administrators In this process Admin can view all the administrators that are appointed by him for responsibility division. and he can all the details of them completely in this module. View Offers In this process Admin can view the offers he provided . Because he should delete the offers as and when the time of the particular offer has been elapsed. View Permanent Agents In this process Admin can view the permanent agents that r under his guidance. By viewing this module he can have the complete idea that who are the new agents added as permanent and also their details. View Messages In this process Admin can view all the messages that are sent by agents for enhancements and has the privilege to implement the enhancem ents if the requirements are really needed. Can view all the messages that are sent by agents for enhancements and has the privilege to implement the enhancements if the requirements are really needed. View Buses In this process, admin can view the details of the services and their appropriate timings and their halts and also the type of services and all other in demand(p) details. ViewTripDetailsIn this process, admin can view the details of the services and their appropriate timings and their halts and also the type of services and all other desired details. ViewBusTypes Instead of direct messages to each and every account with this service Admin can display the message into the notice board and is accessed by every person. Logout Whenever the Admin wants to quit the application he needs to use this service so that the session will be nullified so that no one can access his account thus restrict others in accessing the Admins account. 2. Actor Agent Registration for new Lic ense ? Registration ? Add Offer ? View Offers ? Send Messages ? View Messages ? al-Quran Ticket ? clam up Ticket ? Add Customer ? View Customers ? Logout Request for new clear In this process, new bus station that is agent want to establish should take a license from the Central agency i. e. Head Office . In the license enfranchisement establishment details. Location, date details will be there. Registration In this process, agent can change his password by submitting the specified handle like agent id, old password, new password, retype new password.If he enters the lay out values then his password and he will get new password. Add Offer In this process, offers will be announced by agent office to implement business strategies such that it will improve the throughput and withstand in the competitive environment. View Offers In this process, the existing offers include and also to delete the offers if the specified offer time has been elapsed. Send Messages In this process , the total offers include new & old will be maintaining at the agent office. If the correspondent agent office has some permanent customer it can send messages to them. View Messages In this process, every agent maintain list of messages to which they have sent, the messages how the people (customers r interactive with both agents and Administrators. Book Ticket In this process, agent can book the tickets as the requirement of the customer approached by verifying the availability of trips, timings, availability seats. Block Ticket In this process, agent office maintains details of customers if any one wants to cancel the tickets immediately they can block the tickets by assigning to others who r ready that trip. .Add CustomerIn this process, if any customer wants to register with the agent he has the privilege to add the customer and make the services available to this new Customer. View Customers In this process, every agent office maintains data about the customers, and their complete details regarding the journey along with his journey details. And also the services he was using. Logout Whenever the Agent wants to quit the application he needs to use this service so that the session will be invalidated so that no one can access his account thus restricting others in accessing the Agents account. 3. Actor Customer ? picture ? View Offers View Messages ? Send Messages to Agent ? Send Messages to Administrator ? View Bus Services ? View Bus Trip details like timings ? Send Request to agent for booking a ticket ? Logout Register In this process the Customer who wants the intended services provided by the agency. He should submit the details required, and if they r valid then only he will be given with one unique ID, Password which he should submit while login phase. If he forgets the password or Id he will be provided with an option to regain its Uid And password, but he should submit some details correctly with the data which he was submitted during r egistration phase. View Offers In this process, customer see offers according to that he can register to view the offers. If he is eligible for that offer i. e. time is not elapsed he may bargain that offer. View Messages In this process, customer sees all messages that are given by Customers, Agents, and Administrators and may get the required information. Send Message to Agent In this process, Customer Registration modifications (i. e. ticket cancellation, buy new tickets, dates postponement) emit. If the customer has any problem-sending message to agent can solve him. Send Message to AdministratorsIf the agents could not solve problems of the customers, meesage are sent to the administrators to solve those problems. Such they may get the accurate information from the adminstrator or send their of import suggestions to implement by the Organization. View Bus Services This process helps to get overall information about bus services i. e. Bus timings, routes such that he may g et the services for his desired timings And may travel accordingly. View Bus Trip details like timings This process helps to give overall information about bus services And No. f Trips, Bus timings, routes, availability at his desired timings Send Request to agent for a ticket booking In this process customer can directly reserve the tickets in nearer agents or from far place. by submitting the source & destination details along with the fare details i. e. the stylus of amount to be paid. Logout Whenever the Customer wants to quit the application he needs to use. This service so that the session will be invalidated so that no one can access his Account thus restricting others in accessing the customers account. IMPLEMENTATION Program Design LanguageThe design design language is also called as structured English or pseudopodia. poundal is a generic reference for a design language PDL looks like a modern language. The difference between PDL and real programming language lies in the narrative text infix directly within PDL statements. The characteristics required by a design language are ? A fixed system of keywords that provide for all structured constructs date declaration and modularity characteristics. ? A free syntax of natural language that describes processing features. ? Subprogram definition and calling techniques that support various nodes of interface description.PDL syntax should include constructs for subprogram definition, interface description date declaration techniques for structuring, conditions constructs, repetition constructs and I/O constructs. PDL can be extended to include keywords for multitasking and/or concurrent processing interrupt handling, interposes synchronism the application design for which PDL is to be used should dictate the final form for the design language. exam Objectives The main objective of examen is to bring on a host of errors, systematically and with minimum effort and time. Stating formally, we can say, ? Testing is a process of executing a program with the intent of decision an error. ? A successful test is one that uncovers an as yet undetected error. ? The tests are inadequate to detect possibly present errors. ? The software more or less confirms to the quality and reliable standards. Unit Testing ? The office of the coding and unit testing phase of software development is to rede the software design into source code. Each component of the design is implemented as a program module. The end-product of this phase is a set of program modules that have been individually tested.To enable the engineers to write good quality programs, every software development organization normally formulates its own coding standards that suits itself. A coding standard addresses issues such as the standard ways of laying out the program codes, the template for laying out the function and module headers, commenting guidelines, variable and function naming conventions, the maximum number of source lines permitted in each module, and so forth. ? During this phase, each module is unit tested to find the correct working of all the individual modules.It involves testing each module in isolation as this is the most efficient way to debug the errors identified at this stage. Another reason behind testing a module in isolation is that the other modules, with which this module has to be interfaced, may not be ready. Integration and System Testing Integration of different modules is undertaken once they have been coded and uni tested. During the integration and syste3m testing phase, the modules are integrated in a planned manner. The different modules making up a software product are almost never integrated in one shot.Integration is normally carried out incrementally over a number of steps. During each integration step, the partially integrated system is tested and a set of previously planned modules are added to it. Finally, when all the modules have been successfully integrated and tested, system testing is carried out. The goal of system testing is to ensure that the developed system conforms to its requirements laid out in the SRS document. Our project is integrated and tested by using an activity by name (- testing. (- testing is the system testing performed by the development team. MAINTENANCEMaintenance is any work done to change the system after it is in operational. The term maintenance is used to describe activities that occur following the delivery of the product to the customer. The maintenance phase of the software life cycle is the time period in which a software product performs useful work. Maintenance activities involve making enhancements to products, adapting products to new environments, correcting problems. In this be retrieve the data from the database design by searching the database. So, for maintaining data our project has a backup facility so that here is an additional retroflex of data, which needs to be maintained. More over our project would update the yearly data on to a CD, which could be used for later reference. CONCLUSION ? WORK DONE The e-Ticketing was successfully designed and is tested for accuracy and quality. During this project we have accomplished all the objectives and this project meets the needs of the organization . The developed will be used in searching, retrieving and generating information for the concerned requests. ? GOALS ? rock-bottom entry work. ? Easy retrieval of information ? Reduced errors due to gracious intervention ? User friendly screens to enter the data Portable and flexible for further enhancement ? Web enabled. ? Fast finding of information call for BIBLIOGRAPHY Reference Books 1. The Complete Reference Patrik Naughton, Herbert Schildt 2. Java Servlet Programming Orielly 3. Html shadowy Book Steven Hozner 4. The Programming Language Ivan Bayross 5. Software Engineering James Websites 1. http//www. java. sun. com 2. http//www. sunsoft. com 3. http//www. javasoft. com 4. http//www. apress. com 5. http//www. oracle. com 6. http//www. jspin. com

Functions of Secondary Market

Functions of tributary Market The alternate food martplace provides an organized place and the implement for trading in securities. They also ensure that the deals struck in the course atomic number 18 clean-living and within the framework of law. The efficient functioning of the line of credit supplant creates a conductive climate for an supple and growing primitive coil grocery store for new issues. An active and healthy secondary food securities industry in existing securities leads to better psychology of expectations considerable broadening of investment enquiries renders the parturiency of raising resources by entrepreneurs easier.Good performance and outlook for equities in the hold exchanges imparts buoyancy to the new issue market. The good stock exchange facilities the following heavy activities in the economy of a country i. Favorable climate for addition of primary market ii. Widening of investment opportunities for the investor iii. Improving availab ility of resources for the championship enterprises iv. Buoyancy in new issues v. Increasing confidence among the players of the market classic functions 1.Provide a mean solar day-and-night market It is the important objective of the secondary market to ensure stability in hurt as the trading natural action progresses. The stock market achieves this aim by providing a continuous market infrastructure to the investor, thereby ensuring liquidity in the market. Some important characteristics of a continuous market are i. Frequency of trades ii. Small spread between bid and ask expenditures iii. Immediate execution of order iv. Change in legal injury beingness minimum as the transaction takes place The enefits of continuous market are that it creates marketable liquid investments and facilitates collateral lending. 2. Frequency of gross sales A market will be liquid only when a buyer/ seller behind find seller/buyer. If there are no buyers/sellers for some securities or ther e is long wait before a buyer/ seller can find counterparty, such(prenominal) market are called illiquid markets. The primary criterion for a good market is whether investors can sell their portfolio holding quickly with minimal price fluctuation at the succession of sale.Liquidity occupies a central place in evaluating the efficiency of exchange. The market should assume three important dimensions of liquidity. They are i. Depth ii. Breadth iii. resilience Depth refers to the situation wherein buy and sell orders are available at the quoted price for the desired quantity. If it is not available, then the market is termed as modify market. The number of the transaction or the number of orders determines the breadth of the market. Otherwise the market is known as thin.The response to orders to changes in price reflects the resilience of the market. 3. falsifiable measurement of liquidity Empirically, liquidity is measured by the number of old age a lodges dish out is traded, out of the number of geezerhood in the year, when the market is open. The number of days particular share is being traded reflects the liquidity of the market. If it is traded actively 50%of the days when the market is open, then it is termed as liquid. The variation in price of the share from one trading day to another also determines the liquidity of the share.If the difference between the lowest asked(or offered) price and highest bid-price is wide, the market is said to lack depth and considered shallow. Actually bid- asked spread is an antonym measure of liquidity. Tick as the minimum difference in range between two orders on the same side i. e. , buy or sell entered on the system for a scrip. Trading in scrips listed on BSE is done with the size of 5 paise, it is 1 paise, in cocktail dress of mutual funds and others to encourage orders at finer rates and remediate liquidity.In United states, variation of one eighth point in the price from the immediate trade is considere d liquid. In our country, the minimum tick start from 0. 25. 4. mean(a) price determination The prices in the stock market are set(p) by the interplay of the forces of supply and demand. When the prices are going up, it is termed as bull stage and when the prices are going down, it is termed as bear phase. As seen earlier active, control and two-way auction trading takes place in the stock exchange. The progeny is as near a market for desolate trading and free competition, as can be found anywhere.The bargains that are struck are at the fairest price, determined by the basic laws of supply and demand. At time large-mouthed scale speculator activities raise the price of the share. barely such activities are ephemeral in nature. There is no fundamental kin between book value, par value and market value of share, because the share price may experience a boom if there is large scale investment from an individual or mutual fund company and also during such period too much money c hases a few shares.The performance of the stock exchange is also subject to speculation, which at times, drives up the prices above the investment worth and at others, below it. under the normal circumstances, one would leave the situation to the forces of the market- what the buyers and sellers willing to bid and to offer. But in India, conscious policy is adopted to make shares attractive to the unlike institutional investors who evaluates our market, in relation to the other emerging markets. The stabilization of the stock market prices around a reasonable level would be desirable. . caution to Financing Activities Listed company finds it helpful to sell further issues of their shares in the primary market based on the good performance of their earlier ones. An active market and the good market prices for the companys shares makes the task of raising funds through further issues easier. This facilitates the company to leave out good price for the subsequent primary issue in t he market. Rights themselves have an immediate and a wide market in the stock exchanges, provided the price including the premium reflects a fair price.Thus the stock exchanges enable a company to market further issues successfully by creating a continuous market for the rights. 6. Other allied functions * The market prices established in the stock exchange trading are useful for tax purpose. * The stipulation on disclosure and transparency ensures that the investors have access to information on the listed companies, particularly with regards to their fiscal condition. * It serves to protect the investors interest by eliminating the dishonest and irregular practices uncontrolled in the brokerage trade. To ensure a measure of safety and fair dealing to protect investors interest. * To provide the instant valuation of securities caused by changes in the internal environment. * To induce companies to improve performance since the market price at the stock exchanges reflects the perf ormance and this market price is readily available to investors. * Secondary marketing is vital to an efficient and modern capital market. * In the secondary market, securities are sold by and transferred from one investor or speculator to another. * lay on the line management