Wednesday, July 31, 2019

A Look into Edna St. Vincent Millay’s Poem

Edna St. Vincent Millay’s poem â€Å"What lips my lips have kissed† evokes a sad song that where a lady is regretting all the lovers she had lost. The choice of this particular poem by Edna St. Vincent Millay could be justified by the fact that readers can easily relate to it because it talks about a universal theme, which is love. Although it reeks of regret and loneliness, the poet effectively successfully used palpable symbols and words to describe the past events that transpired in her life. In the poem, the speaker casts herself as a â€Å"lonely tree†. One writer, Epstein (2001) proclaims that this poem is â€Å"a summing up of [the author’s] love life to date, and an occasion to invoke the classic themes of elegy, the tempus fugit and the ubi sunt† (p. 139): What lips my lips have kissed, and where, and why I have forgotten, and what arms have lain Under my head till morning . . . . . . . . . . . . . . . . . . . . . . And in my heart there stirs a quiet pain For unremembered lads that not again Will turn to me at midnight with a cry. Thus in the winter stands the lonely tree, Nor knows what birds have vanished one by one, Yet knows its boughs more silent than before. It seems that the speaker in the poem is an aging lady signified by the songless tree. Indeed, she is an epitome of loneliness and regret, one that we might be tempted to read as a prototype of abandoned womanhood, pathetic and powerless. Male desire in the love sonnets where the woman as a speaker always masquerades feminine weakness and sentimentality; often beseeching, and consumed by desire. However, when a male lover speaks, it would imply â€Å"authority of suffering and, perhaps more importantly, with the authority of convention†. When Millay masquerades as a male poet masquerading as a lovesick woman, the â€Å"sense of where sincerity meets gesture and how authority aligns itself with gender is confused† (Freedman, 1995, p. 113). In its structure, the poem is classified as a sonnet that has a particular rhyming pattern: abbaabba cdedce. The poem uses alliteration and assonance. It is also rich in naturally-occurring symbols, which all readers can easily connect. The poem begins with a one-sentence octave that presents the situation in which the narrator finds herself–inside a house during the rain, reminiscing about her past and forgotten lovers. The inverted sentence structure of the first two lines almost suggests a question rather than a statement: How many lovers were there? The alliterations in the first line additionally emphasize the repetitiveness of the narrator’s sexual encounters. At the same time, the perfect tense mean that this phase of her life has been completed, and the body part symbolisms of lips, arms, and head imply her distance from the experience. In the third line, Millay moves to the present tense, where she describes the memories of her lovers (using a ghost metaphor) aroused by the rain, a symbol for gloom and melancholia. These are the lovers that â€Å"tap and sigh†. The narrator seems insinuating that the lovers themselves are irrelevant. For the same reason, â€Å"Millay picks a metaphor that hints at facelessness and lack of welcome and resonates with the specific time of the midnight hour†. The central phrase in this section is â€Å"quiet pain,† an â€Å"almost-oxymoron suggesting that the narrator's grief is muted or accepted† (Schurer, 2005). As signified by the forward movement of tenses, Millay gives the readers a slight glimpse of things to come as well: However, undeniably, she   regrets everything and she expects no intimacy in the future. In the end, the female narrator seems not interested in the identity of her lovers as in the memory of the emotions they allowed her to experience.   Despite the sadness and regret, the narrator presented peace or redemption as a â€Å"faint echo of the emotion of love from her youth† (Schurer, 2005). Despite the lonely themes and symbols, we can sense of equality in love; to the demand by women that they be allowed to enter the world of adventure and experiment in love which men have long inhabited. However, Millay does not sound to be any feminist to argue for that equality. She just makes it subtle, exhibits it in this poem and turns it into beauty. Works Cited Epstein, Daniel Mark. What Lips My Lips Have Kissed: The Loves and Love Poems of Edna St. Vincent Millay. New York: Holt, 2001. Freedman, Diane P., ed. Millay at 100: A Critical Reappraisal. Carbondale, IL: Southern Illinois University Press, 1995. Schurer, Norbert. â€Å"Millay's what lips my lips have kissed, and where, and why†, The Explicator, 63.2 (Winter 2005): 94-97.

Character Sketch Sample

Sample character sketch – my friend Liz. My friend Liz is the most amazing friend anybody could ask for. We’ve been through so much together, we’re basically like sisters. We met on the first day of school in sixth grade, both of us terrified by the massive size of the middle school. She had the locker right above mine. I told her I didn’t know anybody in our class and she said â€Å"You do now. † We’ve been friends ever since. Most boys think Liz is cute. She has long red hair, cascading over her shoulders. She laughs about everything and when she does, you see about a hundred white teeth – so bright, you almost need sunglasses. When she laughs, her eyes grow wide, glowing emerald green. Liz likes to dress kind of skater-ish, in camouflage pants, sweatshirts, and wristbands. But, she’s unpredictable, too. Sometimes she’ll wear overalls or a fancy dress. She must have three closets full of clothes, because she barely ever wears the same outfit twice. Liz is the most lively, animated character I’ve ever known. She’s always rushing around, trying to get the latest scoop on everybody. It’s like she’s in the FBI. Right before she shares important news, Liz tosses back her hair, takes a deep breath, and quickly looks side to side, to be sure the coast is clear. She never says anything mean about people, she just wants to know what’s going on. She always supports me in everything I want to do. Not many girls in our group of friends play sports, but when I told Liz I wanted to go out for basketball, she said â€Å"Go for it. † Now, she comes to see almost every game I play and cheer me on. Not only is Liz a tremendous supporter, she also trusts me to give her my honest opinion and to say what I feel. Last year, she thought Mrs. Jones gave her a lower math grade than she deserved. I told her the truth – that Liz handed everything in late and what did she expect? Next marking period, Liz got her work in on time, and pulled off an A-. Thanks to me, she said. Liz is a wonderful listener. She lets me tell her all my problems and she never diminishes the importance of my worries. I can tell she’s really listening, too, because she looks directly in my eyes the whole time, like she’s trying to see inside my head and figure me out. We don’t always agree on everything, and sometimes we even fight like sisters. But, in the end, we always stick together. Writing a CHARACTER SKETCH – can you draw your friend IN WORDS? Writers need to describe people believably and realistically. They need to describe characters in such detail readers can actually feel they know them. A character sketch is a way to put people on paper. It goes beyond just describing a person’s physical characteristics. Character sketches are most effective when they reveal â€Å"telling† details that capture the essence of someone’s personality. ?You are going to write a character sketch for someone you know. It could be a friend, family member, or anybody you know well. Here’s a list of things to include in your character sketch: †¢ opening – introduce the topic (your friend) †¢ explain how you met, or where you know each other from †¢ give a physical description – appearance, clothes, voice, habits, mannerisms, etc. †¢ personality trait #1, and supporting evidence †¢ personality trait #2, and supporting evidence †¢ personality trait #3, and supporting evidence †¢ closing comment – try to reconnect to your opening You do not have to follow this exact order, but your character sketch does need to include all these parts. TIP: Think about your friend in vivid detail. What color are her eyes? What kind of clothes does she favor? What kind of shoes? How is her hair cut and styled? Dig deeper. How does he talk? Fast, slow, soft? What nervous habits does he have? What does he daydream about? What music does he like? What sports? What subjects in school? These details can say a lot about personality.

Tuesday, July 30, 2019

Music : Expressionism

‘Prettier' from five orchestral pieces is an atonal (no significant key signature) Expressionist piece of music written by Austrian composer Schoenberg (who is associated with the expressionist movement of the early twentieth century and was the founder of the second Viennese school of music). It was composed in 1909, written for a big orchestra, made up of mainly flutes oboes clarinets and bassoons.Additionally some other brass instruments and percussion play in the piece such as the trumpet, trombone, xylophone, cymbals and bass drum. Prettier' can be described as a very intense and restless piece of music with many quick changes in speed, mood and instrumentation. The translation of Prettier into English is ‘ a sudden change in fortune†, which perfectly describes the nature of this piece. One factor which makes ‘Prettier' a clear example of expressionist music is the instrumentation.In this piece the instruments are often played at the extreme of their regi sters, heightening the dramatic style which sets the stage for this expressionist piece of music by including extreme contrasts in the dynamics, which an be seen in the score of the piece where Schoenberg marks from ‘up' to ‘if. Another two factors which portray the genre of this piece are the constantly changing textures and unusual structure; there are many motifs which are changed throughout the piece however there is no concrete main melody.It is made out of complicated melodic fragments which are based on 6 notes from 12 different semitones in a scale, known as hexachord, which are almost in rondo form (abaca.. ) where the same melodic idea returns many times. The ‘a' theme, which returns more than twice, are each very different to each other and described as ‘almost unrecognizable'. This creates a sensation of unawareness , a feeling of unpredictability and suspense for the listener, we never expect what we will hear next.The idea of using free rondo fo rm is used to bring the same atmosphere, mood and feel of a motif rather than the exact, precise copy of notes. An example of a hexachord in this piece is the recurring hexachord in bar 8 , ( a, b flat, c , c sharp, e , f) laded as a motif and chord by the horns Each different section of the piece varies in length swell as the continuously varying textures and tempos. Schoenberg frequently changes the speed within Prettier. He uses a lot of different note lengths ranging from deem-semiquavers to semibreves.This use of constantly changing tempos, melodies and dynamics heightens the dramatic nature of the piece making it very exciting for the listener! The timbre, pitch and harmonies of this piece are very particular to the style of expressionism. The dissonant harmonies and clashing sounds throughout this piece create discomfort for the listener and are successfully used to convey the desired emotions of the composer, which he was aiming to express through his music.As well as the su dden and extreme changes in dynamics and rhythms in this piece, the textures vary as well. This piece has a contrapuntal texture with moments of polyphonic and homophobic textures too; ranging from a solo flute to the whole orchestra playing which provide possibilities of creating dramatic moments of climax thin the song, once again conveying deep emotions and conflict, fitting perfectly into the expressionistic genre.The melody in Prettier is fragmented and is played by all the instruments at different times throughout the piece, known as ‘agglomeration's' (tone-color melody). Additionally the melody is very angular and distinct and often uses repeated notes or short motifs, which enhances the uncomfortable feeling for the listener. Schoenberg plays with the timbre of this piece, with quick, sudden changes between families of instruments such as the brass ND woodwinds; which in result varies the sound of the piece making it more unusual and unpredictable.Prettier perfectly fi ts into the category of expressionism through the exiting use of changing dynamics, tempos, harmonies, textures, orchestral devices, melodies and rhythms, making this piece exiting and vibrant to listen to every time. Each time it is played new moments are found that were previously unknown to the listener, bringing something new to its audience each time it is heard, whether it be emotional or categorical, thus evidently fitting into the genre of expressionism.

Monday, July 29, 2019

Motivational Strategies Essay Example | Topics and Well Written Essays - 750 words

Motivational Strategies - Essay Example Microsoft tries to remove any barriers that create obstacles to learning, therefore it provides quick access to training resources and has designed programs that improve performance and provide guide and support to employees. Concerning engineers, Microsoft provides to them formal and informal classroom sessions, lab workshops with mentors, brief expert-and leader-driven talks, online community discussion, think-tank session, networking evens and online knowledge-management databases made available on the company’s intranet. (T+D,2007). In its Tuition Assistance Program, Microsoft covers all tuition fees and textbooks for courses related to work. Its in-house training programs are quite extensive offering technical and nontechnical skills knowledge. Microsoft’s employees have traditionally low morale. Microsoft in order to overcome this issue has launched the program MyMicrosoft. The goals of this program are: improve work atmosphere, train management, increase investment in the staff share plan, a career plan framework for all employees and some other benefits like grocery delivery, on-site access to laundry, dry cleaning services and the return of a towel service at the company’s gym. Typically, Microsoft’s basic incentive tool were stock options. Nowadays, the stock prices are very low so the stock options are not as an effective incentive tool as it used to be. Microsoft tried to satisfy unhappy employees by offering them the opportunity to sell their worthless options, though they did not get what they hoped to get. Microsoft chose a plan of direct grants of restricted stock to replace options. In this plan.Unlike options, actual shares are guaranteed to provide some value to employees, as long as the company doesnt go under. And at mature companies that pay dividends, employees can make money off their equity without having to sell off shares. That makes it

Sunday, July 28, 2019

Annotated Bibliography of Business Sources Essay

Annotated Bibliography of Business Sources - Essay Example Firstly, I grasped the meaning of key terms such as internal restructuring. Secondly, I also learned to show differences between company profits by using tables which can make it easier for readers to follow. Anver, Versi, ex al. "Africas Top 100 bank African Business Annual Rankings." African Business. Business Source Premier (2008): 2p. Oct2008 The article talks about banking in Africa and outlines information about the top 1000 banks found on the continent. Whilst the total assets of the 1000 banks are estimated to be $856 billion, it can be noted that about 84% of the banking assets are held by the top 30 banks. South Africa has 43% of the continent’s total bank assets. This article is also related to accounting where the author mainly relied on using numbers and statistics to illustrate the structure of banking in Africa. The author also talks about profits in the banking sector which is related to accounting. This article is very enlightening particularly when I am also writing something characterized by figures and statistics. The article is arranged in a nice format where ideas flow in a sequence which is easy to follow. It compares the operations of each bank as well as the profits. Steve, Forbes. "Two Biggest Things Still To Do." Forbes 182. Business Source Premier (2008): 1p. 13 Oct. 2008. This article is about fraud which is often found in many U.S. companies. It can be noted that the reason behind fraud is mainly caused by risky borrowing and lending. The crimes are often discovered by accident or following tip-offs.

Saturday, July 27, 2019

Essay Example | Topics and Well Written Essays - 500 words - 197

Essay Example The blacks wanted the power and freedom to determine their own destiny. They believed that the black community was not free until they had the power to determine their own destiny. The party leaders also pushed for full employment of the black people. They believed that it was the duty and responsibility of the federal government to ensure that each man gets employment and is guaranteed a reasonable income. They did not believe in working for the white American businessmen since they believed that doing so would lead to oppression and discrimination. The Black Panther advocates also pushed for restitution for slave labor. They believed that the government has been robbing the blacks by exercising unfair treatment and as a result they were demanding an overdue debt as restitution for slave labor and mass murder of the black community. They also pushed for proper and adequate housing. They believed that the white landlords would not give proper housing and so there was a need for the government to build decent housing for its people. Education was also key in this party. The blacks believed that a man without real knowledge of the society, has little chance of survival. They therefore advocated for education that teaches black history. Blacks also demanded that they should be excluded from military service. They believed that they should not be forced to fight for a racist government that is not protective. Besides, they demanded an instantaneous end of police brutality and murder of the black fraternity. They believed that they could organize and form self-defense troops that would enable them to protect the blacks against violent racist police. Consequently, they also demanded that when brought to trial, blacks should be tried by a jury of their own race as defined by the constitution. Finally, they demanded freedom for all black prisoners held in American prisons and jails. This is because

Friday, July 26, 2019

Pharmacology Case Study Example | Topics and Well Written Essays - 500 words

Pharmacology - Case Study Example Applicable to patients who were diagnosed with hypertension, OConnell (2014: 12) pointed out the idea that â€Å"calcium channel blockers† should be given to those with African origin. Since the patient is an African man, the administration of â€Å"calcium channel blockers† is much better as compared to Maxzide 37.5/25 mg each morning. As such, the best option to improve CF’s blood pressure is to change the patient’s current medication to calcium channel blockers and ACE inhibitors (i.e. Lotrel – amlodipine and benzepril, Teczem – diltiazem and enalapril, or Lexxel – felodipine and enalapril) (Makani et al., 2011). Calcium channel blockers can effectively reduce the patient’s blood pressure by purposely dilating the arteries (Elliott & Ram, 2011). The main reason behind the need to combine the use of calcium channel blockers with ACE inhibitor is not only to increase its effectiveness in treating hypertension but also to prevent the risks of developing peripheral edema caused by the use of calcium channel blocker monotherapy (Makani et al., 2011). The following are the initial dosage of each alternative medication: BMI between 30 to 34 is classified as â€Å"obese 1† whereas BMI between 35 to 40 is classified as either â€Å"obese II or III† (University of Vermont, 2015). The fact that the patient’s BMI is 32 strongly suggests that the patient is obese. To prevent the risks of developing serious organ damage (i.e. stroke or heart failure); patient teaching should focus on the need to encourage the patient to change or modify his lifestyle. In general, BP of more than 140/90 is classified as â€Å"Stage 1† hypertension (OConnell, 2014: 12). Given the fact that obesity is one of the possible causes of hypertension (OConnell, 2014), patient teaching should include weight control through proper diet and

Thursday, July 25, 2019

Personal Development Plan. Advancing Career Development Coursework

Personal Development Plan. Advancing Career Development - Coursework Example These include sparking the audience’s interest and presentation practices that respect the audience’s time. Use Toastmasters international articles, which offer information on oratory skills improvement, including how to deal with audiences that are distracted by capturing their imagination (Turner, 2013: p40). One excellent resource to improve networking skills is PLNs technologies that offer functionalities like communication and presentation with one’s peers that one can adapt and change to suit their needs (Turner, 2013: p46). It allows learners to structure complex environments of content and people according to their preference. Skill layer technology solutions, a social network management tool, will also be used to enhance communication with individuals within my network, as well as to remain in touch with them (Turner, 2013: p47). Ability in this skill will be measured at the end of the academic year. This is because it is only during this period that I will have met most of the important people to my academic and future professional career. It is also possible to assess one’s understanding about commercial realities and business benefits by participating in discussions about the related industries, as well as in the comment sections of most business-oriented websites like the WSJ. To improve on this skill, the mindTools.com website offers concentration strategies and tests that help to identify distracters in the environment and offers ways to adopt new strategies (Smale & Fowlie, 2012: p20). Ability in this skill will be evaluated towards the end of the school year in October and November. This is because this period is the most important for finding self-motivation by applying aspects of the skills as learnt over the semester. The Self-Regulated Strategy Development tool has persuasion maps. These are interactive online tools that enhance the student’s ability to map

Mass Extinctions in the fossil record during End Permian Research Paper

Mass Extinctions in the fossil record during End Permian - Research Paper Example What distinguishes the theories is their validity in empirical terms as well as relevance scientifically. The first significant theory alludes that at the time of the mass extinction of species occupying the earth, there could have been a very catastrophic occurrence of volcanic eruption. The magnitude of the volcanic eruption could have been so big that it ended up wiping out a significant proportion of the earth’s population. The other postulation alludes that a meteorite might have struck the earth thus instigating the death of different species that occupied it. What intrigues is the magnitude of catastrophe that could have wiped out almost all the species adorning the earth without causing a major damage to the earth’s crustal rock layers. Besides, the selectivity in the survival of the species also raises doubts in reference to the theories alluded to offer the explanation to the occurrence of the wipe out. Evolutionary and archeological studies have pointed out to the possible occurrence of a period of a near extinction of all the species on the earth’s surface. This was irrespective of their habitat. This period is referred to as the end Permian time. The occurrences at the time have not been ascertained. The fact is that there have only been theories put forward to possibly try and explain the phenomena that occurred at the time. The following discourse puts the occurrences during the end Permian time into perspective. The focus is to try and critically analyses the occurrence of events during the time. In doing that, the works seeks to make references to theories postulated by scholars in regards to explaining the occurrence. The theories or stipulations are categorically selected depending on their relevance, accuracy, as well as empirical validity. The objective is to try and give a possible chronological account to the occurrence of the near extinction of

Wednesday, July 24, 2019

Narrative Writing Essay Example | Topics and Well Written Essays - 1000 words

Narrative Writing - Essay Example "You will be mine little son," I have told and have put the puppy in a small baby carriage, "you sit here, and I shall bring you a dummy." "It's not interesting game!" the puppy has thought, "We'd better to play hide-and-seek." While I have searched for a dummy, the puppy has fallen out of the carriage and has gone 'to see the sights' of his new home. It has come into one of rooms and has stood motionless. Near the bed he has seen a big black animal and looked at the puppy without one wink."Who are you" the puppy has exclaimed, moving back to be on the safe side, "I am not afraid of you."The black animal was silent. Having grown bolder, the puppy has come closer. "Let's be friends with you," the puppy has cautiously offered. "Mum! Come here!" I have loudly cried, "Fluffy barks at your panther." In the meantime Fluffy has closely come to a mysterious animal. "And why you are silent" the puppy has asked and, having smelt an animal, has touched it with its paw, "How cold you are!" "No! Don't..!" mum has cried, running into the room, but it was too late. The porcelain figure of the panther has swayed, and having hit against the floor has broken in two pieces. "Ah, you silly little thing!" mum has threatened the puppy with the rug. "No I'm not. I am not silly," the puppy have taken an offence, and got under the bed, "I just wished to get acquainted. Forgive me!" it has put out an attractive face, and has there and then got its bitters with a wet rag."You never do it again!" cried mum. "It hurts," whimpered the puppy, on being hidden just in case, "I did not know that it is forbidden. I promise I'll never do it...A real 'miracle' has got out of out of the box. It was a puppy, small and fluffy, as a bear-cub. While I have searched for a dummy, the puppy has fallen out of the carriage and has gone 'to see the sights' of his new home. It has come into one of rooms and has stood motionless. Near the bed he has seen a big black animal and looked at the puppy without one wink. "No I'm not. I am not silly," the puppy have taken an offence, and got under the bed, "I just wished to get acquainted. Forgive me!" it has put out an attractive face, and has there and then got its bitters with a wet rag. In the room, I have put the lead on its neck and have tied it to the back of a chair. Then I have fenced the chair with two pillows from the sofa, and have covered all this strange construction with a blanket. The chair has reeled, pillows got down, and the lead at last was untied. The released puppy has rushed to the kitchen. I was helping mum to prepare the meal. She cut tasty sausage in thin slices, and I laid the table. But I have made the other decision: "If you do not wish to play my games then sit in the corridor," and I have closed the door of the room. This night the puppy has lead on a carpet. It couldn't fall asleep sleep. It was laying and peering into the darkness. "Still I am just a small puppy and do not know much, therefore I make silly things, for which they punish me," the pu

Tuesday, July 23, 2019

Friendships with a pinch of salt Essay Example | Topics and Well Written Essays - 250 words

Friendships with a pinch of salt - Essay Example Tobias had been my best friend since fourth grade. He was a bright eyed, blond haired new student who strode into the classroom as if he owned the place. While I tend to be withdrawn, he was confident, sure of himself and would always stand up for what he wanted. Up until now, I had always considered this to be a good trait, today I wasn’t so sure. â€Å"Come on, we’re running late.† He had pulled me into a half-jog; half-sprint and now turned so he was running backwards and grinned at me. The hot pavement was harsh on my bare feet and I grimaced, trying to keep up with him. I was not good at running at the best of times. My breath came in short gasps and I had to brush at my forehead to prevent the sweat from dripping down into my eyes. â€Å"Run faster.† He egged me on. Finally, we stopped and I stood breathing heavily holding the wall up, or perhaps it was holding me. The world swam in front of my eyes and I could vaguely see Tobias standing in front of me looking slightly concerned. â€Å"Hey. Are you alright?† He put his hand on my shoulder and looked at me. I tried to answer him, but it was hard to talk. The words caught in my mouth and it was becoming difficult to breathe, each breath was harder than the one before. I fumbled in my pockets, looking for my inhaler. There were far too many pockets on this pair of shorts, two on each leg, two on the back and another couple of hidden pockets inside other ones.

Monday, July 22, 2019

The significance of the post-war settlement Essay Example for Free

The significance of the post-war settlement Essay After World War 2, the extent to which participating countries had lost acted as an eye opener. What these countries expected never came to be. Having fought in war 1, and then war 2, most resources were running towards depletion and worst of all masses of people lost lives, economies, weakened, infrastructure destroyed and industrial development totally demerited. Post war era was the start to a new world order mainly to be characterized by peace, potency, mutuality and prosperity. After World War 2, every country that had taken part in it was left on a stand still. Having invested most of the resources in the war that turned out to be fruitless, it was a turning point for a majority of them. Governments had to work out new sources and systems of accumulating capital, re-institutional arrangements. The period around and after World War 2 led to advancement and fundamental industrial relations re-birth. The development at that time reflected positive future stability and durability. In the whole continent, only Sweden and Switzerland experienced tranquility. All the other countries were faced with war, colonization and enmity. Post war reconstruction of national boundaries, economical atmosphere and political systems facilitated unprecedented significance in development. The change in economical, institutional perception and perspectives is a niche definition of my understanding of post war settlement. (Fulcher,1987). In my discussion, I will scrutinize two global economical giant countries, which are Germany and Russia. To start, after World War 2 life was indeed very tough in the Federal Republic of Germany, with almost all systems in a shattered condition. Very hard living standards came up as a result of food shortage, diseases, instability, lack of job opportunities and unemployment. As a result activism and demonstrations took center stage, this was made possible by the Germany’s unionification. All employees were under the same confederation, which pushed for further reforms putting better living standards in their priority. This move turned out successive due to the fact that employees and unions existed on a mutually potent relationship, that is, one could not live without the other. Citizen thought that separation of politics and industrial issues would be a merit to their welfare. Another development that followed in turn was economical stability and expansion. To boost their progress, Britain sent food relief in 1946. Later on, Germany saw itself join membership of EEC in 1957 through the help of a strategic plan known as the `Marshal Plan’. Old industrious organizations, firms and companies remain stable as growth began to be felt. Post wartime is seen as a stability period in most countries that experienced the effects of war- Volkswagen, the automobile manufacturer is one of the companies that lived on and continue to today. Germany was forced to concentrate all it effort in policies and strategies towards economic growth. They had to halt active political presence for decades. With serious considerations being put into practice, Germany woke up to an economic excellence. As an advantage of post war activity, Germany became, and still is, among the giant economical strengths in Europe and universally. In a bid to bounce back, post wartime witnessed the practice of mass production, industries embarked on manufacturing of goods in surplus. As a result it attracted German citizens to mass consumption. This was a great move since the more they produced the more it was consumed. The gross net profit grew drastically so did their economy. Life felt cozier as job opportunities increased because of the mushrooming of many industries. Politically the country was shaped newly completely for quite a long time, at one time Germany had to lay low. They had been toppled completely and their Nazi regime wrecked down. This turn of events saw its leaders tried at Nuremberg for crimes against human rights, they had to face justice in their own home place or rather their site of propaganda brilliance. (Skidelsky, 1979) Although the late tyrant leader Adolph Hitler escaped trial and execution at that time: he later committed suicide in Berlin, at the end of the war. He felt so intimidated of the counts he would be changed for. World War 2 left many German capital towns in ruins from the massive bombings carried out in it. Germany was segregated into zones by capability and powers; this in turn resulted to a permanent political stability and settlement. The European Union that strongly stands out today has it motherly roots from world war 2 time. In fact it grew from the European Coal and Steel Community (ECSC), Its primary intention was to develop the steel and coal resources from member states, support and boost their economies.the ECSC facilitated the diffusion of the tensions that had resulted between enemy countries in world war 2. With time, this economic co-operation/merger grew enoumously , adding in new members hence broadening their scope, later the European Union was formed from EEC, European Economic Community. Many other prominent organizations today have their history date back to World War 2; for example, the world trade organization,WTO, the United Nations, the international monetary fund IMF, the World Bank in which then West Germany but now Germany had taken part in its formation and stand as members. Another very important significance is the evolution of initial and the follow up of advanced technological progress that had captivated interest during the war. The development was reflected in almost all industrial fields: in electronics, computers. These advancements helped Germany create the foundation for its realization into further development. This finally transformed to what was referred to as the post world war 2 world. The new technology, assisted in the efforts to fight diseases that had erupted during the war. Massive research, monitoring, evaluation and development, quickly attained nuclear power which had adverse impacts on the scientific fraternity, creating a network of laboratories in the whole country therafter . In addition, the struggling to crack codes initiated computer technology. There were social effects too which significantly changed almost all war participants to new degrees. One of them was increased involvement of women in the working force which replaced the place taken by many men during the war: though this initiative was reduced in the following years, due to the fast changing society. The system forced women to taking care of home and family oriented matters.(Rowthorn en.others,1992). In military aspects, the World War II had established the beginning of airpower. Germany could not be left out, this was an opportunity to draft active self defence system. They highly concentrated on project they had earlier established. Advanced aircraft composing of aeroplanes, jet fighters and missiles developed earlier saw further developments. Battle ships and tanks sprout out into the ever growing competition, with guns and ammunination reaching to leathal dynamics. Air power capability is today a constituent in any military operation or mission. (Seidman,1950) Russia on the other hand is said to be the main beneficiary when border revision was done. It saw Poland, Finland, Romania and other countries pushed into Russian boundery in their favor. Germany was not considered in the process. As a result their land area became larger creating room for development. Infrastractural systems remain almost the way they used to in Russia. Only few places had their system completely damaged. Compared to Germany, this was better off since repairs would cost less. Post war saw Germany’s roads and communicational networks left completely in a shuter. Though very many people lost lives during world war 2, in Russia than in Germany, at some point their demograpfic figure took a new turn. This was alos facilitated by increased agricultural activity. Most of Russia’s citizens depended on agriculture, fishing, forestry, or craftworks. Due to increment on the agicultural industry, their economical strength also took a stable ground-this is a major similarity that was experienced in almost all countries that had experienced war. (Gourevitch ,1985) Immortatility rates decreased and in turn working population had a future expectation. Hunger was kicked out and fertility saw the countries graphs rise demeritically. Having food and medicine eradicated the diseases that had become threatening. Politically, Russians remained constantly active compared to Germans who had to gio slow for decades. This was a crafty thing to concentrate on after the war. The approach given was also great to say, it was trying to balance business and politics. Like their counterparts the Germans, unemployment at the beginning of world war 2 hit their population badly, this led to workers demonstrations all over the country. Trade unions at the time wanted drastic change to help improve their living standards. This though was not left to spread like any other bush fire, heavy police and army contigence ensured that a runing battle existed toi keep the country tranquil and the demonstrators at bay. (Taylor,1989) Russia had severe problems following their decision to turn captured prisoners of war into plantation slave labourers. This is another reason that led to activism towards fighting for humanity/human rights. Every significant effect practiced found its relation with industrial settlement. Looking at their military state, Russia developed also in terms of strategic ideas and policies. Industrial inovations led to further outstanding developments in their manufacturing industry. This move also resulted to an interest in nuclear power. In fact, Russia heavilly invested on the project. Facing challenges though, the idea had to be carried out in top secresy due to the effect that had been seen at Nagasaki and Hiroshima. (Ferner en. Others,1994 World super power countries felt empathetic of what had happen and so took it as a mandate to control nuclear power. Countries would only be allowed to use it for developmental purposes and destruction. Russia was the most highly sort after provider of nuclear energy. They made tremendous sale that in turn aided them in developing the state. It also provided job opportunities to it people. Peace settlements characterised both Germany and Russia, this positive move indicated brighter future. Since Russia was facing challenges of cold war because of several stauch stands on their accord they saw it an apportunity to reconcile with enemy states together with Germany. The negotiations indicated that the initiative was to be the last war and a new beginning to everlasting peace. They agreed at all peace summit meetings held in Paris that idealism would take over rivalism. This was further pushed by existence of the league of nations. Expectations reached as far as waterways internationalization. This was a step ahead towards cohesive industrial relations. Independence was being experience in countries that had been colonized by Germany, they had decided to let own rule and democracy prevail. In contrary though, Russia in their side continued too occupy countries like Latvia and others with iron and steel mineral deposits or resources. Though they remain under Russia these countries witnessed new traditions that in deed very good. There was self freedom for everyone, movement was very safe generally. As a result, people grew some self determination which help industrialize Russia particularly, it was all busy-busy to earn a living a condition that turned out to be very superb.( Ryder, 2008) Preparations for compensation is another significant effort that saw ist launch in Germany more than Russia, a lot appeared to be done by Germany to cater on the aspect of enmity/crisis and conflict. Russia became laxile on this one which negatively impacted on their relationship with most countries. In turn, their industrial relations and development faced difficulties and setbacks in their wake to cold war period thereafter. Property ownership was also top after world wra 2, normally public resources were subject or prone to seizure or confiscation, by the then victorious super power countries. Many industries saw ownership and income channelled to their banks but after the war, rules changed. This saw native citizens own proprerties, industries, plantations which was a brilliant sign that the world was changing. This brought an understanding between waring communties who had different and diverse cultural variance. Although Russsia as well as Germany felt like they had lost or unfortunately settled at nothing compared to first world war, They later realized that peace was even sweeter and priceless, at some point. World war 1 settlement was not perfect, that is why war two broke out but this time around, it would be the last time blood spilled. People in fact were turning closer to God at the time, in Germany for example it saw the demise or end of the rough Nazi regime, churches were established in the folloe up.Stability in capability to keep and maintain order is something that came in world war 2 post war settlement. As a result of peace prevalence all the energies were shifted to industrial innovations and development in both Germany and Russia. In conclusion, it can said that the significance of post world war 2 was almost the same in both these two countries. The extent to which states experienced the war was relative to how harder they would be forced to work in order to achieve stability. For instance, Germany had suffered majorly in most important industries plus they had their reservouir flow of capital from their colonies in Europe and other continents stop in the wake of freedom and independence. Although it was almost incapable to bounce back they had undying determination.( Theory, 2008) On Russia case is all the same thing in all industrial developments, only that they had resources and capital that made it easier on them to progress. Politically, too, they saw a major and notable change but not as in Germany whose Nazi regime end and Hitler’s death became the starting point to humanity, democracy and of course their core economical booster indistrial stability. Reference: Fulcher J(1987). `Labour Movement Theory versus Corporatism`, Sociology Vol. 21 no 2, pp 231-252 Hyman R in Hyman R. and A. Ferner(1994) New Frontiers in European IndustrialRelations Blackwell London, Chapter one Jukka Pekkarinen, Matti Pohjola, and Bob Rowthorn (1992). Social corporatism asuperior economic system? Clarendon Press330.17 Joel Seidman(1950) Industrial and Labor Relations Review, Vol. 4, pp. 55-69 Published by: Cornell University, School of Industrial Labor Relations Peter Gourevitch (1985) Unions and Economic Change: Britain, West Germany and Sweden 331.881 GOU Ryder (2008) Post war economy: retrieved from the World Wide Web at http://www.geocities.com/Athens/Rhodes/6916/ww2.htm Skidelsky R (1979) The decline of Keynesian politics: State and economy in Contemporary capitalism: Croom Helm edition, London Taylor A J (1989) Trade Unions and Politics: a comparative introduction,Basingstoke,Macmillan Theory (2008) The world since 1945: retrieved from the World Wide Web at http://www.flowofhistory.com/units/etc/19/FC128

Sunday, July 21, 2019

Polymer: The Glass Transition

Polymer: The Glass Transition Formulation Chemistry Polymer: The Glass Transition In the solid state, semicrystalline polymers exhibit both amorphous and crystalline morphology. The glass transition is a property of only the amorphous portion of a semi-crystalline solid. [1] The glass transition temperature, Tg, is the temperature at which the amorphous materials change between the glassy and rubbery form. 1.1 Amorphous and Crystalline Polymers The amorphous polymers consist of molecules that are oriented randomly, unlike the crystalline ones which have polymer chains packed in ordered, repeating patterns in the three-dimensional crystal lattice. However the glass transition is different to melting because only amorphous polymers undergo the glass transition. Melting is a transition that occurs in crystalline polymers when these chains are disoriented from the crystal structures and become liquid. A sample of semicrystalline polymer can be composed of both amorphous and crystalline portions, therefore it can have both a glass transition temperature and a melting temperature. 1.2 Glassy and Rubbery States Below Tg, the amorphous regions of a polymer are in a glassy state and most joining or contact bonds are intact. [2] The molecules may be able to vibrate slightly, but are virtually motionless in which portions of the molecule wiggle around. Therefore polymer is generally hard, brittle and rigid. As the polymer is heated until it eventually reaches its glass transition temperature, the molecules start to wiggle around. In inorganic glasses, more bonds are broken with increased thermal fluctuations; while in organic polymers, non-covalent bonds between chains also become weaker. By heating above Tg, there is long-range segmental motion where the polymer chains can move around easily. It is now described in its rubbery state which offers flexibility and softness for plastic deformation without fracture. Below Tg, the chains are firm and unbendable to relieve the force being applied. This is due to either (a) the chains are strong to resist the stress; or (b) the force applied is excessive for the motionless polymer chains to overcome, so the polymer sample will just break or shatter.[1] Such mobility with temperature is heavily dependent upon the â€Å"heat† content because Tg is a kinetic parameter. The Tg decreases with slower melt cooling rate. It is also affected by other factors listed in section 1.4. Heat is a form of kinetic energy that causes random motion of molecules and the pliability of polymer, in comparison to â€Å"cold† polymers which lack kinetic energy to move around and hence are brittle on cooling. Example of this behavior is the glass transition of chewing gum. It is soft and pliable at body temperature, characteristic of an amorphous solid in its elastic, rubbery condition. The gum then turns hard and rigid when it comes into contact with cold drink or ice cube in the mouth. 1.3 Glass Transition vs. Melting The differences are outlined in the table below: Generalised Anxiety Disorder (GAD): Theories and Treatment Generalised Anxiety Disorder (GAD): Theories and Treatment Introduction Modern cognitive-behavioural therapy (CBT) grew out of the merging of behavioural therapy, developed in the 1950s to 1970s, and cognitive therapy developed in the 1960s (Graham, 2004). Broadly, it attempts to deal directly with a clients manifest symptoms through both cognitive and behaviour strategies. Cognitive theories target particular irrational beliefs which are thought to be the source of behavioural and emotional problems. Historically, CBT is well-established in the treatment of anxiety disorders, but has only been adapted more recently for use in psychosis (Tarrier, 2002). This essay will first examine the theory and practical treatment of generalised anxiety disorder (GAD) using CBT. Then the treatment of psychosis will be considered in the same way, but concentrating on the similarities and differences to the treatment of anxiety. CBT Treatment of Generalised Anxiety Disorder The main feature of GAD is excessive and uncontrollable worry (Wells, 2002). The DSM-IV states that for a positive diagnosis of GAD, the worry must occur more days than not over a period of six months (American Psychiatric Association, 1994). The DSM-IV also lists a number of somatic and cognitive symptoms which include, for example, muscle tension. A variety of different treatments have been used for GAD including both directive and non-directive therapies. Fisher Durham (1999) examine the effectiveness of different treatment methods and the number of clients making a full recovery. The most successful treatments in their meta-analysis were CBT which achieved a recovery rate of 51% and applied relaxation which achieved a 60% recovery rate. To understand how GAD is treated using CBT, it is necessary to understand the model of worry that it is based upon. Beck (1976) produced the most widely referenced model of anxiety which links emotions and thinking. In this model it is the patients thoughts and images relating to anticipated danger that immediately precede, and cause, anxiety attacks. In appraising their environment, anxious patients overestimate both the likelihood and severity of a negative event occurring and so take defensive action (Blackburn, 1995). Under the umbrella term of CBT a number of different approaches to treating GAD have been used. They normally focus on two main factors: cognitive work aimed at challenging the clients beliefs and thought processes as well as behavioural work teaching anxiety management strategies (Wells, 2002). Borkovec (2002) describes the cognitive aspect of CBT as focussing on how the client perceives the world and attempting to move this onto a more accurate footing. Generally, this is done by eliciting how the client is perceiving events in an anxious way. Then, the client is encouraged to apply logical thought processes to their own perceptions to challenge the way they are thinking. The therapist attempts to supplant these original thought processes with cognitive interpretations that do not lead to increased anxiety. Clients are usually given homework in which they attempt to identify anxiety attacks, what preceded them and what followed them. Hopefully, by demonstrating to the client that their catastrophic predictions do not occur in reality, it is possible to break down the automatic negative thoughts. Some researchers have been critical of this basic cognitive approach as it does not focus on meta-cognitive factors (Wells, 2002). A revision to the model has been added by Wells (1995) who introduces the distinction between Type 1 and Type 2 worry. Type 1 worry is that referred to above the worry about physical symptoms and external events. Type 2 refers to worrying, as it were, about worrying: meta-worrying. Type 1 worrying is dealt with in approximately the same manner described above, but greater focus is given here to Type 2 worrying. Type 2 cognitive interventions focus on two factors: the uncontrollability of the worrying and appraisals and beliefs about the dangers of worrying. Once negative meta-cognitions have been elicited, they can be challenged and worked with in the same way as before. An example of this type of metacognition is that a client can believe that worrying is harmful because it increases blood pressure and thereby this is harmful to the body (Wells, 2002). The therapist would address this by explaining that occasional high blood pressure is not associated with chronic health problems. The second aspect in treating anxiety by CBT is the use of behavioural strategies (Borkovec, 2002). This involves teaching the client techniques for relaxing their body such as meditation, progressive muscle relaxation and relaxing imagery. Clients are encouraged to practice these techniques even when they are not anxious so they feel comfortable with their implementation. In addition, in some circumstances clients will be exposed to situations which make them anxious in order to provide realistic practice opportunities (Borkovec, 2002). A further type of behavioural strategy employed is a stimulus control method. This involves the client in deciding on a period of the day in which worrying will be carried out, carrying out monitoring of their daily worrying, and trying to only worry in the designated period. Then, in the designated period of worrying, clients practice their cognitive skills. Two other techniques used are behavioural activation strategies encouraging the client to engage in more pleasant activities and imagery rehearsal techniques which involve practicing new responses to environmental cues likely to cause worry (Borkovec, 2002). CBT Treatment of Psychosis Unlike the symptoms of anxiety which can be stated relatively succinctly, the experiences of those with psychosis vary to a large degree. Those with schizophrenia-spectrum disorders, for example, can suffer from hallucinations, delusions, perceptual anomalies as well as some associated problems like depression and anxiety itself (Garety, Fowler Kuipers, 2000). The CBT therapist will, therefore, be targeting a greater variety of symptoms than with anxiety, and usually over a much longer period: perhaps three or more times as many sessions as for anxiety. The use of CBT in psychosis was nevertheless developed from the techniques used to treat conditions like depression and anxiety (Tarrier, 2002). CBT is generally used in addition to powerful antipsychotic medications and is aimed at helping clients to better cope with their psychoses. CBT has been investigated in a number of different patient groups, the largest body addresses those with chronic conditions that are treatment-resistan t, with studies generally finding it to be effective (Sensky et al., 2000). More recent studies have found it to be effective in acute and recent-onset schizophrenia (Lewis et al., 2002). The theoretical model for CBT in psychosis is necessarily much broader than that used for anxiety. While the relations between thoughts, feelings and behaviour are important, these have to be set against wider issues. The causes of psychosis are usually multi-factorial and thought to stem from the social environment, biological vulnerability and psychological processes (Garety et al., 2000; see also the stress-vulnerability model: Strauss Carpenter, 1981). In order to reach an effective case formulation, therefore, the therapist needs to examine the confluence of these different factors along with the clients stresses, vulnerabilities and responses. Like anxiety, at the centre of the cognitive model of psychosis lies the idea that the therapist can address all the different types of symptoms by examining cognitive processes. One example Garety et al. (2000) point to was made by Frith (1992), which claims that symptoms of thought insertion are a result of deficits in normal cognitive self-monitoring processes. Similarly, the anxious component of psychosis is seen as resulting from maladaptive appraisals. At heart, the theoretical model of CBT for psychosis relies on the same fundamentals as that for anxiety: that making the client aware of these problematic thought processes will provide some relief. Where it differs theoretically is that it is addressing a wider variety of factors social and biological as well as psychological and so the treatment has to reflect this fact. Turning now to the practical aspects of CBT for psychoses, Garety et al. (2000) outline a six-stage process. The first involves building and maintaining a therapeutic relationship. This was taken for granted in the discussion of anxiety because, to a therapist, this is a given. With psychotic clients, though, there are significantly greater barriers to the building of a therapeutic relationship. The client may well suffer psychotic symptoms during sessions as well as being paranoid about and suspicious of those trying to help them. The second stage is providing cognitive-behavioural coping strategies for the positive symptoms of psychosis (Garety et al., 2000). Similarly to anxiety treatment, this might include reality testing on delusional thoughts, self-monitoring of symptoms and using distraction and withdrawal (Phillips Francey, 2004). The third stage involves attempting to understand the experience of psychosis. Here, the therapist attempts to bring together strands from the clients life and experiences and link them to their psychotic symptoms. Further, however, the therapist also looks to provide some sort of normalisation to the already high level stigmatisation associated with psychosis. This third stage in treating psychosis differs considerably from the treatment of anxiety, which generally does not address wider social issues in depth. Fourthly, the therapist will specifically examine hallucinations and delusions (Garety et al., 2000). This will often be hard as the client will have developed a series of beliefs that are heavily reinforced. These are addressed using standard CBT techniques such as those used in anxiety. Where the approach for psychosis differs, however, is that attempts to change long-held thoughts are not made until well into the therapeutic process and the therapists manner is slower and softer. In addition, compared to CBT for anxiety, there is less emphasis on the patient generating their own alternative interpretations, and more on the therapist providing them. Some clients may not even agree their beliefs are delusional and so the therapist has to work within the boundaries set by the client. The fifth aspect of CBT for psychosis as laid out by Garety et al. (2000) focuses on depression, anxiety and negative self-evaluations. Those suffering from psychosis will often have low self-esteem. This can be the result of long-standing negative self-evaluations which can be targeted by cognitive therapy techniques of reviewing how they arose and then providing a challenge to the thinking. Both depression and anxiety are also treated in this way. Finally, Garety et al. (2000) look at issues of social desirability and risk of relapse. Throughout therapy, the therapist is looking to the future and helping the client to think about their short and medium-term plans. While Garety et al.s (2000) model is influential, it should be noted that the treatment of psychoses, like that for anxiety, is not monolithic there are a variety of different formulations and approaches. Some focus more on particular aspects such as the delusions or coping strategies. Garety et al. (2000) argue, however, that many treatments are now becoming more integrated in order to address the wide range of symptoms in psychosis. Outcomes and Comorbidity The outcome research varies across different types of psychosis and so it is difficult to compare with anxiety outcomes. A further complication is the different methods used and the rapidly developing nature of CBT as an intervention. Psychosis is certainly harder to work with than anxiety because of the sheer number of factors involved and, as a consequence, the outcomes are generally not nearly as good as those for anxiety. One clear similarity between the CBT treatment of psychosis and that for anxiety is their comorbidity in psychotic disorders. Looking across bipolar disorder, schizoaffective disorder and schizophrenia, Cosoff Hafner (1998) found 43% to 45% of psychotic patients had a form of anxiety disorder. Indeed, in their sample, Cosoff Hafner (1998) found that, even though anxiety disorders are often responsive to treatment, none of the patients had been treated for it. Research has questioned whether anxiety might be a dimension of a psychotic disorder like schizophrenia while others suggest they form a subgroup of the patient population (Braga, Petrides Figueira, 2004). Supporting the dimensional view, Lysaker Hammersley (2006) have found a relationship between both delusions and inflexible thought (characteristic of psychosis) and higher levels of social anxiety. Further, looking at schizophrenia in particular, Braga, Petrides Figueira (2004) argue that much of the research shows better outcomes for those treated for comorbid anxiety. While the repertoire, order and specific implementation of techniques used in CBT differs between psychosis and anxiety, the therapeutic relationship will be central to success in both treatments. Factors that Beck Emery (1990) highlight include trust on the part of the client in the therapist, a collaborative approach and a focus on educational issues. Conclusion The treatment of both anxiety and psychosis with CBT is based on identical underlying principles. Theoretically, both approaches involve focussing on the types of attributions and automatic negative thoughts the client is experiencing as well as aspects of behaviour. Similarly, both approaches require a strong therapeutic alliance in order to be successful. The practical implementation of each intervention is, however, tailored for the disorder. The client suffering from psychosis is likely to have a much wider range of symptoms to deal with and, as such, CBT for psychosis generally takes longer and addresses more complex issues. Part of this will involve the therapist in attempting to understand and interpret the experience and causes of psychosis. This is in contrast to CBT for anxiety which will focus more on problem solving. There is evidence to suggest, however, that anxiety forms a part of certain psychoses, and in this situation its treatment should form part of a wider integr ated approach. Finally, outcomes in CBT for psychosis are generally more modest than in anxiety as psychotic symptoms are considerably more challenging for the therapist. References American Psychiatric Association (1994) Diagnostic and statistical manual of mental disorders (4th ed.). Washington DC: American Psychiatric Association. Beck, A. T. (1976) Cognitive Therapy and the Emotional Disorders. New York: International Universities Press. Beck, A. T., Emery, G. (1990) Anxiety Disorders and Phobias: A Cognitive Perspective. Cambridge: Perseus Books. Blackburn, I. M. (1995) Cognitive Therapy for Depression and Anxiety. Oxford: Blackwell Publishing. Borkovec, T. D. (2002) Psychological aspects and treatment of generalized anxiety disorder. In: D. J. Nutt (Ed.). Generalised Anxiety Disorder: Symptomatology, Pathogenesis and Management. London: Taylor Francis. Braga, R. J., Petrides, G., Figueira, I. (2004) Anxiety disorders in schizophrenia. Comprehensive Psychiatry, 45(6), 460-468. Cosoff, S. J., Hafner, R. J. (1998) The prevalence of comorbid anxiety in schizophrenia, schizoaffective disorder and bipolar disorder. Australian and New Zealand Journal of Psychiatry, 32(1), 67-72. Fisher, P. L., Durham, R. C. (1999) Recovery rates in generalized anxiety disorder following psychological therapy: An analysis of clinically significant change in the STAI-T across outcome studies since 1990. Psychological Medicine, 29, 1425-1434. Frith, C. D. (1992) The cognitive neuropsychology of schizophrenia. Hove: Lawrence Erlbaum Associates. Garety, P. A., Fowler, D., Kuipers, E. (2000) Cognitive-behavioural therapy for people with psychosis. In: B. Martindale, A. Bateman, M. Crowe, F. Margison (Eds.). Psychosis: Psychological Approaches and Their Effectiveness Putting Psychotherapies at the Centre of Treatment. London: Gaskell. Graham, P. J. (2004) Introduction. In: P. J. Graham (Ed.). Cognitive Behaviour Therapy for Children and Families. Cambridge: Cambridge University Press. Lewis, S. W., Tarrier, N., Haddock, G., Bentall, R., Kinderman, P., Kingdon, D., Siddle, R., Drake, R., Everitt, J., Leadley, K., Benn, A., Grazebrook, K., Haley, C., Akhtar, S., Davies, L., Palmer, S., Faragher, B., Dunn, G. (2002) A randomised controlled trial of cognitive behaviour therapy in early schizophrenia: acute phase outcomes in the SOCRATES trial. British Journal of Psychiatry Supplement, 43, 91-97. Lysaker, P. H., Hammersley, J. (2006) Association of delusions and lack of cognitive flexibility with social anxiety in schizophrenia spectrum disorders. Schizophrenia Research, 86(1-3), 147-53. Phillips, L. J., Francey, S. M. (2004) Changing PACE: Psychological interventions in the prepsychotic phase. In: P. D. McGorry (Ed.). Psychological Interventions in Early Psychosis: A Practical Treatment Handbook. Chichester: John Wiley and Sons. Sensky, T., Turkington, D., Kingdon, D., Scott, J. L., Siddle, R., OCarroll, M., Barnes, T. R. (2000) A randomised controlled trial of cognitive- behavioural therapy for persistent symptoms in schizophrenia resistant to medication. Archives of General Psychiatry, 57, 165-172. Strauss, J. S., Carpenter, W. T. (1981) Schizophrenia. New York: Plenum. Tarrier, N. (2002) Cognitive-behaviour therapy in the treatment of schizophrenia. In: H. Hafner (Ed.). Risk and Protective Factors in Schizophrenia: Towards a Conceptual Model of the Disease Process. Berlin: Steinkopff Verlag. Wells, A. (1995) Meta-cognition and worry: A cognitive model of generalised anxiety disorder. Behavioural and Cognitive Psychotherapy, 23, 301-320. Wells, A. (2002) Cognitive therapy for generalised anxiety disorder. In: F. W. Bond (Ed.) Handbook of Brief Cognitive Behaviour Therapy. Chichester: John Wiley and Sons. Southwest Airlines: Culture, Values and Operating Practices Southwest Airlines: Culture, Values and Operating Practices Rollin King planned to start low cost airlines that would shuttle passengers between San Antonio, Dallas and Houston. This idea came in his mind due to the complaint of businessmen about the delay of airlines. When all airlines were in losses at that time the Southwest Airlines were earning profit. It was because of the business strategy. They offered lowest and simple charges to get passengers to their destination on time and Muse wanted his executive team to be willing to think independently instead of worked on the institutional practices. One of the things that attract me a lot that there was a plan of profit sharing with senior employees that was first in the airline industry (Arthur A. Thompson, 2008). What grade would you give Southwest management for the job it has done in crafting the companys strategy? What is it that you like or dislike about the strategy? Does Southwest have a winning strategy? Southwest airlines performed successful in the airlines industry. The company demonstrated the ability to quickly dominate markets. Here are some strategies that were really appreciable: Product Positioning Strategy: Southwest airlines carefully projected its image in front of customers and competitors. It offered ticketless travelling by not assigning seats to the passengers so that they could reach the destination on time (Arthur A. Thompson, 2008). Price Strategy: Southwest airlines had offered the lowest domestic airlines charges. There was a plan of profit sharing with senior employees that was first in the airline industry (instituted in 1973) (Arthur A. Thompson, 2008). Promotion Strategy: Southwest airlines wanted to concentrate more on customer preference and benefits. It encouraged its employees to dress casually at work and this created a positive image in front of the customers. (Arthur A. Thompson, 2008). Digital Media Promotion: This was a first airline that developed a web site and online booking facility (Arthur A. Thompson, 2008). One drawback of southwest airlines was that it was taking 6 to 12 rounds in a day. Fuel, air frames and diesel were very costly and southwest airline were not fully boarded. Hence the revenue generation was minimal and the airlines could not make sufficient profits (Arthur A. Thompson, 2008). QUESTION 3 What are the key policies, procedures, operating practices, and core values underlying Southwests efforts to implement and execute its low-cost/no frills strategy? Some policies for the low cost are: The company was operating only one type of aircraft having 737 seats which minimized the spare parts, inventories, maintenance training, and proficient improvement. The company offered ticketless journey which eliminated the expenses of printing and processing paper tickets. The company was serving airports near metropolitan areas and medium sized cities that minimized fuel cost and helped to reach destination on time. Southwest was using point-to-point scheduling of flights instead of hub-and-spoke system which was more efficient in comparison with the later. Southwest didnt have first class section in any of the flights and offered only beverages and snacks (Arthur A. Thompson, 2008). QUESTION 4 What are the key elements of Southwests culture? Is Southwest a strong culture company? Why or why not? What problems do you foresee that Gary Kelly has in sustaining the culture now that Herb Kelleher, the companys spiritual leader, has departed? The company provided free and satisfied environment to the employees. It had positive, innovative and simple culture which contributed to the growth of the company. (Arthur A. Thompson, 2008). Garry Kelly was appointed as vice chairman of the board of directors in 2004. There are some problems that I foresee when Gary Kelly has sustaining the culture: Other rival airlines can copy their spirit and culture that can be problem for the company. Gary was applying changes according to his taste and the company was facing continuous changes. Hence it became difficult to survive in rapidly changing environment. There was no market stability because of the rapidly changes environment (Arthur A. Thompson, 2008). QUESTION 5 What grade would you give Southwest management for the job it has done in implementing and executing the companys strategy? Which of Southwests strategy execution approaches and operating practices do you believe have been most crucial in accounting for the success that Southwest has enjoyed in executing its strategy? Are the any policies, procedures, and operating approaches at Southwest that you disapprove of or that are not working well? The southwest management should get the highest grade in my opinion. Employees maintenance has been crucial in accounting for the success of southwest airlines. The strategy of lowest price with accommodation was very tough but the southwest airlines made it easy (Arthur A. Thompson, 2008). I disapprove due to the following reasons: Southwest should try to expand its existing route. They didnt have Miami International airport as hub even though it is a city of population with a large number in and out flights. Another policy was that the fat people had to take two tickets for being able to sit comfortably in the airline. This was embarrassing to the people who were overweight (Arthur A. Thompson, 2008). QUESTION 6 What weaknesses or problems do you see at Southwest Airlines as of mid-2010? There were some problems that came in the mid of 2010 at the southwest airlines: It depended on only one producer. Southwest was running only one flight of 737 seats there must be some optional flight. Booking of flights became difficult because southwest had eliminated the intervention of agents because of commission amount. Southwest were only focusing on the economy class but have no attention towards business class who were willing to pay for their seats. Money was not the big issue for them (Arthur A. Thompson, 2008). QUESTION 7 Does the Air Tran acquisition make good strategic sense for Southwest? Southwest have a very distinctive and unique culture. The Air Tran acquisition put significant risk. Southwest has one type of plane 737. With the acquisition of Air Tran it started flying the 717 to Mexico and the Caribbean. It was a big shift for southwest (Arthur A. Thompson, 2008). The main base of Air Tran was Atlanta that was a huge delta hub while southwest had started to fly their flights out of the United States. This proves that the acquisition made a good sense not only in business perspectives but also for maintaining the cost effectiveness of the service (Arthur A. Thompson, 2008). QUESTION 8 What strategic issues and problems do Gary Kelly and Southwest executives need to address as they proceed to close the deal with the Air Tran acquisition and contemplate how best to integrate Air Trans operations and Air Trans employees into Southwest? Some problems that need to address Gary and the southwest executives are: Southwest needed to incorporate Air Tran employees into the culture of Southwest that was serving good customer service, lowest costs and lowest charges. To analyze the level of Air Tran employees and the Southwest employees. They have to look on the opportunities and try to enhance business share. They have to analyze that how to conduct flights outside the United States (Arthur A. Thompson, 2008). QUESTION 9 What recommendations would you make to Gary Kelly and Southwest executives as the company heads into 2011? The following are the recommendations for the company: The company has to work on the long term goals. Strategies should be made in accordance with the fuel prices which usually act as a barrier to conventional business growth. Provision should be made for reservations to be performed directly on the site of southwest.com without any intervention of third parties. There must be opportunity for internet marketing. The management of the company should start travelling outside the United States for increasing the market shares. The turnaround time should be improved. The prices of the services should be kept as low as possible. Offering of different types of seating classes with different rates should be helpful for increasing the revenue (Arthur A. Thompson, 2008).

Software Piracy From An Islamic Perspective Information Technology Essay

Software Piracy From An Islamic Perspective Information Technology Essay Software piracy is considered to be unethical as such act may hugely affect the right of ones ownership towards his/her products and piece of works. However, statistics (refer:http://www.nationmaster.com/graph/cri_sof_pir_rat-crime-software-piracy-rate) indicate that the rate of software piracy is high especially among the developing nations, in which majority of them are Muslims. In fact, this problem seems to have no ending point despite all the efforts and initiatives done either at the individual, group, national or international levels. Discuss this critical issue of software piracy in the light of Islamic point of view on ethics and ownership. Everywhere in the face of this earth, the issue of using pirated software is widely talked and discussed by people. However, do people really understand and know what is the meaning of software piracy, the copyright infringement of software (often referred to as software piracy) refers to several practices which involve the unauthorized copying of computer software. Copyright infringement of this kind is extremely common. Most countries have copyright laws which apply to software, but the degree of enforcement varies  [1]  . There are several reasons not to use pirated or pirate software. Firstly, it is illegal and there is liability on your part. Its risky. If the software is from an unauthorized source, you could be getting a program that is not fully functional. Secondly, there wont be another version of the software if there is no revenue to put back into research and development. This revenue has made the product affordable to legitimate users. Thirdly, it is totally not eth ical. Or we like to say doing the right thing when no one is looking. Ask yourself how you would feel if your lifes work went without compensation? Start now and be an ethical professional.  [2]   Software piracy refers to the act of copying different computer software without having to pay for them. This is a form of stealing intellectual property. Intellectual property and copyright fall under the same area which declared that copyright provides legal rights exclusively given for a definite periods to the creators of an intellectual work, e.g. literary works (anything in writing), artistic works (drawings, maps, plans etc), musical works, films, sound recordings, computer programs (source and object code) for sale or any other use. It is, in principle, not concerned with things that are not perceivable, such as abstract ideas, concept, and the like. Copyright protection begins when works are actually created and fixed in a tangible form. the emerging digital technology, increasing use of computers, communication technology and their convergence into an integrated information technology, have given rise to challenging legal issues for copyright and many mire are expected in t he future, the ease of distribution, altering digital information and proliferation of computer networking, raise concerns about copyright. Copyright was designed for three basic reasons: to reward creators for their original works: to encourage availability of the works to the public; and to facilitate access and use of copyrighted works by their public in certain circumstances.  [3]   As mentioned before, software piracy is illegal. Sarcastically, many who are practicing and involving in pirate software are fully aware of the legalities, though they are able to reduce continuing the practice. Some think about the only solution that works without splurging too much money on purchasing the product. Around the world, authorities are already enlisted and stated the laws regarding software piracy, these are some of them:  [4]   Counterfeit Copies Producing counterfeit copies and selling them to other consumers is a grave offense. There are different punishments in different countries but all are in agreement that making money off of someone elses intellectual property is an offense. This includes making copies of different software, such as games, video games and other software that is used for the computer. Distributing Counterfeit Copies Creating counterfeit copies and giving them away is also a form of piracy. Even if the person does not charge anything for these copies, it is considered an offense as the person is not the owner of the copyright or does not have the consent of the copyright owner to distribute the copies. This is one of the most rampant piracy practices that the anti-piracy association is trying to fight. Selling Computers with Pre-installed Pirated Software Although the item for sale here is the computer, this is considered an offense as the computer for sale is loaded with different pirated programs. This act is also known as hard disk loading. This is considered an offense because the consumer who will buy the computer does not receive the copy of the original program and the other items included with it, including the CDs or license agreements. Online Sharing Sharing of software online is prohibited. Freeware and shareware programs are the only programs that can be distributed online. Other software is not allowed to be shared with other people over the Internet. This also includes piracy music. The Internet can be used as a means of transmitting illegal software to different people around the world. This is the case for plenty of copyright software. Shareware with No License Although shareware can be legally distributed over the Internet, it becomes illegal when the license for use has already expired. This works for software that can be downloaded for a free trial. Using this software after the free trial has expired is considered software piracy. Software licensing must be acquired before these shareware programs can be shared with anyone else. Islam is supposed to be a complete way of life. A Muslim is bound by Islamic rules and hence is obliged to follow the instructions as prescribed in the Quran and Hadiths. Islam is a religion based upon the surrender to God (Allah). The very name of the religion, al-Islam in Arabic, means submission and peace, for it is in submitting to Gods will that human beings gain peace in their lives in this world and in the hereafter. Islam is considered to be a comprehensive religion and its ethical system is considered to be one of the major ethical systems. Owing to the importance of establishing an ethical system in the field of IT, especially at our present time which is witnessing an ever increasing ethical problems, several specialist organizations have prepared codes of ethics to be complied with by members of those organizations.  [5]   The main agendas which can be recognized to ethics in relation to information technology can be tied down to hacking, privacy, software piracy and IT personnel work ethics. By taking into deeper look, we begin to realize that ethics and information technology involve more issues which on the whole are just as worst. These are some issues related: Computer professionals responsibilities towards their employers and their clients; Proper documentation of software by designers and developers; Proper testing of software by designers and developers; Handover of systems to clients; Designers and developers leaving a computer project mid-stream; Providing maximum security of software to clients; Computer professionals honoring the proprietary issues relating to the algorithms, procedures and data; Computer professionals working towards accurate systems with the aim of Complete data integrity; and Computer professionals involvement in developing systems aimed at unethical ends. In defining the concept of harm that can be done by an IT professional or just normal people and civilians, harm can be defined as the undesired effects to individuals or organizations resulting from any task or system (software) used. In order to avoid the harm Allah has warned us to be honest and trustworthy through his word of wisdom which is Al-Quran in Surah 13, Ayah 119: O ye who believe! Fear Allah and be with those who are truthful. And Prophet Muhammad (saw) has said: The trader must avoid five qualities, otherwise he should not buy or sell: Usury, swearing by God that the merchandise is good, withholding the defect, commending (the commodity) when selling and belittling (it) when he is buying (Tahtheeb al-Ahkam Ch. 7).  [6]   The verses above clearly emphasize the importance of telling the truth and how God perceives those who tell the truth and how they are rewarded. The first verse encourages people to be in the group of those who are honest and only tell the truth whilst the second verse portrays the great reward of those who were truthful on earth. Suggest potential solutions to at least minimize the act of software piracy among these societies. Before we can move on to the deeper solutions, why not we discover what the real are cause the occurrence of software piracy. Causes of piracy and counterfeiting may include rising cost of original software, making them unaffordable to a large segment of the population, advances in technology (tools for reproduction of copyright product) making piracy an easy task, low starting cost for pirating, absence or lack of enforcing copyright laws, huge profits can be made easily by pirates and weak deterrent (fines and prison sentences are minimal). The literature suggests that many factors explain the software piracy phenomena. These factors are grouped into four categories: first is an economic factor; suggest that Gross Domestic Product (GDP) per capita is inversely related to software piracy level. Given the decrease in software prices, it may be that a countrys GDP has a less effect on piracy than it did some years ago. Second is ethnical factors; software piracy is assumed to be more prevalent in nations with a weak IT infrastructure since the quality of available software is lower. Thus, people often copy and work with pirated software. The problem is compounded as software revisions occur. While the need to remain competitive through upgrades is important, it is worthwhile only when affordable. Thirdly is regulatory factors; developing countries may unintentionally encourage software piracy by imposing high tariffs, hence increasing the cost of software. It is also believed that lack of penalties for buying pirated softw are are also reasons for piracy growth. And lastly social/cultural factors; these factors refer to the prevailing social and cultural attitudes shared by members of a society. Many studies have indicated that the culture factor influences a countrys software piracy rate.  [7]   Getting through with the causes, the disadvantages are seen to come along due to lack of public awareness of in third world countries. There is probably the lost revenue to the companies and countries involved, the increased prices by software companies to compensate for losses, lost jobs wherever software companies have plants, lost domestic and foreign investments, lost trust in the ability of some countries to protect intellectual property, immoral activity condemned by all religions, illegal activity leading to prosecution and increased international pressure at the economic, financial, Political level. According to Robert Hollyman, BSA president and chief executive officer, software piracy robs the global economy of hundreds of thousands of jobs and billions of dollars in wages and tax revenues.  [8]   Given the situation of software piracy in campus since it is a small community yet has quite big of potential software piracy practice. Software piracy on college campuses may be generally divided into two categories. The first occurs when the institution itself is violating copyright law. This results when installations of software programs are in excess of the terms stated in the licensing agreement or under law. For example, software that is licensed for use on a single machine is installed on many computers or on a network server, allowing unlimited access. Oftentimes, the school is unaware of the problem as a result of poor or no software management. In other instances the school simply cannot afford to buy software and chooses to risk the infringements. Students more commonly conduct the second type of piracy. In this scenario the piracy often takes place on the Internet where students trade or simply give away software programs as one would trade. If the students are using the schools network or computers to facilitate their illegal activity, the college itself may be held liable. All members of the campus community can take steps to prevent such illegal activity and minimize misuse of computer resources. It is important to promote an understanding of the law and to ensure that specific procedures and protocols are implemented to establish a foundation on which illegal activity may be prevented.  [9]   Discussing these two issues, there are five solutions offered to enable schools to be software legal: Appoint a software manager. Create and implement a computer usage policy, including software and Internet access. Conduct periodic software audits. Establish and maintain a software log of licenses and registration materials. Teach and promote awareness of software compliance. It is stated above that in the case of school, college or university software piracy where some solutions are proposed but, generally these are some more solutions and tips to prevent or lessen the software piracy. The first tip is by applying the code key For the past 5 to 7 years, software developers have devised a plan to lessen or prevent software piracy. This is by using a code key. A code key comes with the software that you buy. Before fully installing the software on your computer, you must provide the specific code key that came with the software. After providing the code key, you can run the software on your computer. The code key also locks after it has been used. This is so that the software cannot be installed on other computers after it has been installed on one. You will have to call the manufacturer of the software to be able to use the code key again. This is not good news to people who pirate software. Secondly is the introduction of open source; described as free software that anyone can download from the Internet. A lot of different software can are licensed as open source. Open source software is under the license free software license. There are also different upgrades for these open source software that can also be freely downloaded from the Internet. By using open source software, people dont need to worry about spending a lot of money for original copies of software. This will also lessen the number of people who are using pirated software as there are alternative programs that can be used and they do not have to pay fines when they are caught. Third is the hardware key; a hardware key is a device that is used for anti-piracy. This tool prevents software vendors to distribute their products or use them without authorization from the copyright owner of the software. The hardware key works when it is attached to a computer. It monitors software licensing and enforces licensing of the protected software that is detected on the computer. This tool will lessen software vendors from illegally distributing the software that they have and is a good prevention measure for piracy. And lastly is anti-piracy software; there are different types of anti-piracy software that are available for free. Anti-piracy software is used to prevent illegal duplication or illegal use of copyrighted software. There is also an anti-piracy software that prevents hackers from getting into the software and copying it without consent from the copyright owner. Some of them are also already integrated on the disks of the software that contains the program. This may also be for piracy music. The anti-piracy association is also looking for other ways to prevent software piracy. Reporting anti-piracy may prevent it from happening.  [10]   These are some of the measures that have been implemented or created to stop and prevent software piracy. With the improvement of technology, there are a lot of things people can use to bypass these piracy measures but there are always new and effective things to use against piracy. The issue of software piracy seems to remain a permanent feature of the marketplace. It is a problem that will not go away, but it can be controlled or curbed to reduce its negative effect on the companies and countries involved. There are some measures that can be taken to reduce piracy acts and the losses associated with them. Piracy is not going to be eliminated or eradicated from the world, but it sure can be curbed and reduced to its minimum activities with the cooperation of the developed and the developing countries in taking these drastic measures to make the world a better place to live.

Saturday, July 20, 2019

America MUST Drill for Oil in The Arctic National Wildlife Refuge (ANWR

America MUST Drill for Oil in The Arctic National Wildlife Refuge (ANWR)   Ã‚  Ã‚  Ã‚  Ã‚  For a drug addict to quit a drug, the best solutions for the addict would be to slowly wean them self off the drug periodically. America can be viewed in a parallel way on its dependency for oil. America needs another source of oil to slowly lessen its overwhelming dependency on foreign oil and to help the process of finding another mass energy source. The Arctic National Wildlife Refuge better known as the ANWR is a rich treasure of oil and gas that can help lessen Americas need for foreign resources. Drilling on the ANWR will not only help the American economy, but will also help aid America in the future. Many ask â€Å"why do we need this oil in Alaska? Is it to make America a more dominant world power? Is it to increase pollution by getting more oil?† The answer is, no. America’s stance is conservation and alternative sources of energy, however, the US cannot switch to another energy resource over night. America needs another reserve to tap into to be removed from Middle Eastern dependency. The US needs something so that its foreign policy is not seized captive by its need for oil. As the US tries to develop new sources of energy the ANWR is a reserve that should be tapped into to help free up the oil dependency. Drilling on the ANWR would significantly help the American economy as a whole. Opening up the ANWR would help diminish our binds to the Middle East and help our own economy by creating...

Friday, July 19, 2019

Sappho And St. Teresa De Avila :: essays research papers

Day by day women are faced with obstacles simply because of gender. In the plays we have read women are faced with obstacles but overcome them. Women in the past were expected to be submissive and not object to the men’s decisions. The world today has changed its face. No longer are women quiet. Sappho and her work is a good example in our readings to represent today’s day and time. Her poems seem contemporary, very modern. The Descent of Inanna ,on the other hand, is a prime example of works we’ve read that represent the past much more.   Ã‚  Ã‚  Ã‚  Ã‚  I strongly believe that each generation is a product of the previous generation, and during the Ancient World, women were not expected to write. They were submissive and their religious superior had the final say. Sappho broke these rules and went against the odds. She wrote and produced wonderful work that everyone can relate to during any time period. Although religious leaders successfully destroyed a great amount of her work, the few parts and pieces that survived still describe things of today in such short lines and phrases. “At noontime'; is a good example of this. It describes the sun and its’ heat and the cricket which till today “sets up a high-pitched singing in his wings.'; “If you will come'; is another example. “At noontime'; is simple to say it relates to today’s world, the sun will always be hot the cricket will always live, but the customs and traditions of people do and Sappho still describes customs from her t ime that live today. “If you will come'; tells of things that generally a person would do for visitors. It says, “ If you will come I shall put out new pillows for you to rest on.'; In just these few lines so much is said. This can be taken as literally taking our new pillows for a visitor to sleep on and rest after a long drive to your home. It may also mean that the host is making the visitor feel at home by welcoming him with open arms. Nevertheless, this poem describes customs that a person would do now. For these reasons Sappho’s works are the most modern in our readings.   Ã‚  Ã‚  Ã‚  Ã‚   The Descent of Inanna is quite the opposite of Sappho. It describes Inanna going into the “underworld'; a place that we do not relate to as easily as a worldly location.

Thursday, July 18, 2019

Computers Have Impacted Me in Many Ways :: Personal Narrative Writing

Computers Have Impacted Me in Many Ways First of all, I want to begin by saying that in order for me to make this paper interesting at all, I am willing to pretend that computers are somewhat fun and exciting but the truth is, I honestly can not stand anything that goes beyond the basics of a computer because if I try to go any deeper I am reminded that it has a bigger brain than I. Due to the fact that I have an undying frustration with these boxes of microchips, this may not be the most professional sounding paper in the world, but I will do my best in trying to make it fun and entertaining. Out of all of the topics that I saw on the list of what we could do this paper on, I found zero that actually interested me, but I chose one anyway. Well, actually, I more or less turned one of the topics into something that I could handle writing five pages on. I am going to talk about how computers impact me in my daily life and I will talk about my past experience with computers and the things that I have learned from them. Computers have impacted me in many ways. Although I do not like to be instructed in how to do certain assignments (web sites and so forth) I do enjoy being able to have the luxury to type a paper on the â€Å"easy to use,† Microsoft word. Being an English major, it is very important that editing be taken very seriously and it makes my life a lot easier knowing that if I get sick of making corrections on a 20 page paper, the computer will pick out the obvious ones so that it saves me time. This may sound like a lame reason, but it saves me a lot of time. Another thing that I love is that it’s so easy to make change to a document font in any way that I want. If I want the words to be size twenty-two then all I have to do is highlight and hit the button. If I want to make a cool cover page with different font styles I can choose from a variety of different designs. Two of my favorites are comic sans and futura xblkit bt.

Thesis: Statistical Hypothesis Testing and Standard Hotels

ARELLANO UNIVERSITY Jose Abad Santos Campus Pasay City PRACTICES ON ACCOMMODATION AND HOUSEKEEPING IN SELECTED STANDARD HOTELS LOCATED WITHIN MANILA: AN ASSESSMENT A Thesis Proposal Presented to The FACULTY OF ARELLANO UNIVERSITY Jose Abad Santos Campus, Pasay City In Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Hotel, Restaurant, and Institution Management By: Monica Trisha Amistad Katherine Kay Ann Blancaflor Cathy Magsanay Kriszhane Manalac October 2011 ARELLANO UNIVERSITY Jose Abad Santos Campus Pasay City APPROVAL SHEET In partial fulfillment for the requirements for the degree of Bachelor of Science in Hotel, Restaurant, and Institution Management, this thesis entitled: â€Å"Practices on Accommodation and Housekeeping in Selected Standard Hotels Located Within Manila: An Assessment† has been prepared and submitted by the following researchers Monica Trisha Amistad Katherine Kay Ann Blancaflor Cathy Magsanay Kriszhane Manalac who are hereby recommended for acceptance and approval for final oral examination RAQUEL L. SALVADOR, DBA Adviser PANEL OF EXAMINERS Approved and accepted during an oral final defense held on September 17, 2011 with the rating of % CHAIRPERSON Member Member ACKNOWLEDGMENT This study would not have been possible without the guidance and the help of several individuals who in one way or another contributed and extended their valuable assistance in the preparation and completion of this study. First and foremost, our utmost gratitude to Dr. Raquel Salvador, our Adviser whose sincerity and encouragement we will never forget. Dr. Salvador has been our inspiration as we hurdle all the obstacles in the completion of this research work. Last but not the least, our family and the one above all of us, the omnipresent God, for answering our prayers and for giving us the strength to plod on despite our wanting to give up and throw in the towel, thank you so much Dear Lord. M. T. D. A. K. K. A. T. B. C. S. M. K. P. M TABLE OF CONTENTS TITLE PAGE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. APPROVAL SHEET†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. ii ACKNOWLEDGMENT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ iii TABLE OF CONTENTS†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. iv LIST OF FIGURES ABSTRACT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. v CHAPTER I The Problem and its Background†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 1 Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 Background of the study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 3 Theoretical Framework†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 Conceptual Paradigm†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 7 Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 8 Hypothesis†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 Scope and Limitation of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 10 Significance of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 11 Definition of Terms†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 12 CHAPTER II Review of Related Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 17 Foreign Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 17 Local Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 27 Foreign Studies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 32 Local Studies†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 5 Relevance of the Related Literature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 37 CHAPTER III Research Methodology†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 39 Research Procedure†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 39 Sampling Design†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 39 Instrumentation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 40 Procedure in Gathering Data†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 41 Statistical Treatment of Data†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 42 Bibliography†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 44 Appendices†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 47 Curriculum Vitaeâ⠂¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5 ABSTRACT TITLE: â€Å"Practices on Accommodation and Housekeeping in Selected Standard Hotels Located Within Manila: An Assessment† STATEMENT OF THE PROBLEM: The study will undertake the Assessment on the Practices in Accommodation and Housekeeping in selected Standard Hotels located within Manila. Specifically, the study will seek to answer the following subproblems: 1. What is the demographic profile of the respondents? 2. 1 Age 2. 2 Gender 2. 3 Civil Status 2. 4 Educational Background 2. What factors can hamper the effectiveness and efficiency of the implementation of Accommodation and Housekeeping practices? 3. 5 Time 3. 6 Motivation 3. 7 Interrelationship with fellow employees 3. 8 Availability of equipments and materials 3. 9 Working environment 3. 10 Flexibility 3. What are the standard practices as regards to the Accommodation and Housekeeping Department? 4. Is there any significant difference between the implemented housekeeping and accommodation practices in the industry and the standard Housekeeping and Accommodation practices imposed by the Department of Tourism? IMPORTANCE OF THE STUDY: This study will be beneficial to the following: The Hotel Industry. The findings of this study may provide the hospitality industry an updated output concerning the trends in the accommodation and housekeeping sector of this vast industry both private and government subsidized hotels. The Hotel Management. This study will provide the hotel management the current trends in the hospitality industry that will aid in formulating better strategies in comparison to its competitors. The Housekeeping Employees. This study will give the housekeeping employees further knowledge as regards to the guest preferences when it comes to accommodation facilities and cleanliness. The HRM Students of Arellano University. The findings of this study can serve as a valuable addition to the pool of research materials available in the university, serving as a reference material for those wanting to conduct similar studies in the future. The Researchers. Not only will the researchers gain substantial information through this study, but they will also partially fulfil the subject requirements for their course. RESEARCH METHOD USED: Research Method Used: Descriptive Method of Research Respondents: 45 respondents comprising of personnel in the Housekeeping Department of the three selected Standard Hotels within Manila. Data Gathering Instrument Used: Survey Questionnaires and Observation Survey Questionnaires will be the primary source of data for this study. The Questionnaires were divided into 2 parts. The first part revealed the demographic profile of the respondents (role in the Housekeeping Department, age, gender, civil status and highest educational attainment). The second part revealed how the respondents perceived time, motivation, interrelationship with fellow employees and other factors as an agent that hampers the effectiveness and efficiency in the implementation of Housekeeping practices. Furthermore, the second part of the questionnaire will also reveal if the Housekeeping and Accommodation standards of the industry is strictly tended for by the Standard Hotels. Upon submitting the survey forms to the hotels, the researchers had facility observations which supplemented the data derived from the survey. PROCEDURES FOR GATHERING DATA For Descriptive Research, the following steps were undertaken: 1. Researchers will look for and collect references from the University Library which will serve as a guide in the formulation of survey questionnaires. 2. An approved and signed letter asking for permission to conduct a study to the 3 selected Standard Hotels located within Manila. Submitted together with the letter are the survey questionnaires to be answered by the personnel in the Housekeeping Department and will be collected 4 days after. 3. Upon retrieval of questionnaires, the results will be tabulated, interpreted and analyzed. 4. Evaluation and Finalization