Wednesday, July 31, 2019

Beauty of Mateship

Poetry is one of the most ancient media in which people express their emotions and perhaps one of the most beautiful; as Howard Monomer gracefully puts It, â€Å"It may be said that poems are In one way Like Icebergs: only about a third of their bulk appears above the surface of the page† (1920 1 991 Australian poetry is no exception to this tradition of versified thoughts and feelings, and many a poet have demonstrated an intense focus on both the artistry and harshness of the environment that harbors this nation.Through the creativity and emotions of the poets, Australians are arrayed In a contrasting light as both likeable and dissociable. This Is particularly apparent in the poems being analyses in this essay – A. B. ‘Banjo' Patterson We're all Australians now and Kimonos Servos' nobody calls me a hog anymore. While both Banjo Patterson and Kimonos Servos infuse their poetry with the spirit of metathesis and acceptance In Australia, Patterson focuses on the ci rcumstances of war which ‘instantly mend' the countries' interstate differences while Servos concentrates on the struggle to achieve tolerance as an international migrant.These two poems share a umber of similarities. The first of these is the focus on equality between all, which creates a sense of unity within the participants In the narrative told by each poem. In We're all Australians now, Patterson makes powerful allusions to the nation as a whole using cities as synecdoche for integration such as â€Å"From Brome to Hobnobs Bay†. Brome is a city on the North-Western coast of Australia, while Hobnobs Bay is an electorate of Melbourne, In the south east of the country; hence, this metaphor Implies the Inclusion of the inure country.The third stanza of the poem Incorporates people of opposing ethnicities, using a true blue' metaphor, â€Å"the man who used to hump his drum†, to introduce the indigenous people to the picture through their musical customs, referr ing to their drum playing as an Identifying feature (Aboriginal Arts and Cultures Centre). They are compared as â€Å"fighting side-by-side† with Tasmania farmers; one cannot escape the carefully constructed and implicit incorporation of two distinct ethnic groups as Tasmania people are likely the whitest Australians there are, given the cool climate of their state.This creates a contrast between pollarded races while portraying them all as equal. The title of the poem suggests the idea of unity and togetherness, and everyone being the same – the phrase â€Å"We're all Australians now† appears as an anaphora throughout the poem to reinforce the importance of Australian identity. Within this phrase, the persona Includes himself, which he doesn't do at any other point throughout the poem; this could suggest that he uses himself as a replacement for everyone through use of the word ‘we're'.In a similar fashion, the use of the word ‘now implies reminisce nce of previous times, such that the conflict between states is gone but will never be resorting. Servos also focuses on equality between people. The title of the poem, which Is also Its first line and Its dominant Ideology, states this concept of personal acceptance and equality quite frankly: â€Å"nobody calls me a hog anymore†. The poet†, set the hopeful yet sarcastic tone: despite all the hardship, the persona is accepted as an Australian.The end of the poem shows the use of schism's in the line Mimi need me, and I need you†, which gives the effect that the sharing and the acquisition of Australian citizenship is a mutually beneficent deal, thus creating equal opportunity for both participants. This type of relationship generally results in a unified environment: Australia is enriched and the protagonist is embraced. Both writers have used Australian symbols, icons and stereotypes in order to relate to the concept of acceptance into Australian society and to relate to a typical Australian audience.We're all Australians now refers to perhaps the biggest icon the nation has, its national flag: â€Å"Our six starred flag that used to fly/Half-shyly in the breeze. † This can create a sense of patriotism in the reader, making them feel proud of their entry and thus allowing them to visualize and work towards achieving an atmosphere of acceptance and metathesis. Patterson also refers to the more traditional, enumerating, well-known occupations of the country, especially as they were at the time of the war.These include the men who worked in the shearing shed, or the shearers, those who worked on the cattle runs, the fishermen, the farmers and the miners, scattered throughout the verses. All of these are attempts to relate with the audience, particularly that of the sass, allowing them to feel as though they too re involved in the metathesis, camaraderie and acceptance that the nation is so well known for. The final important reference to Australian identity in this poem is found in the last stanza: â€Å"And with Australia's flag shall fly/A spray of wattle bough†.The poem states the purpose of this explicitly – it is â€Å"to symbolism our unity. † Perhaps the main drive behind the choice of â€Å"wattle† is something as simple as the fact that all men in Australia can grow the wattle, the national flower, no matter where they come from or what they look like; thus, it creates a bond between the people. The wattle therefore becomes a metaphor for togetherness. Kimonos Servos is a little less ‘romantic' and idealistic in describing Australia's struggle to achieve this same goal.His heavy use of colloquial language and intentional lack of spelling, grammar and punctuation conventions imply that he is not trying to please and appease a demanding, skeptical Australian society but rather use his resume as a good reason for benefiting from the tolerance and equality that is so loved a bout Australia. He tries to replicate the way Australians speak in particular as Servos tends to more often than not perform his poetry, making it more a spoken then a written piece (De Wright).Examples of this sort of language include â€Å"I'm an cozies too†, a tirade of interesting, accusatory Australian slang such as â€Å"Fair dinked ridge dodge a dinky die true blue† and â€Å"Me hog mate Kevin†, where the word â€Å"me†, replaces the grammatically correct term â€Å"my', as this is how it is often pronounced. He deals with parts of life that are vital to common Australian people, detailing that they apply to him also: â€Å"A poet with a mortgage/And a wife, and kids/And gas bills, and a tax file number/Just like you.These depictions of real life Susie living create a common ground for both poet and reader, allowing for the ultimate message to be shared: we all deserve – for various, complex reasons – to be called Australians! The p oems also have a number of differences, segregating their ideologies and themes accordingly. The first of these differences is Patterson softened poetic mood as compared to the experiences which engendered them. The most obvious part of the poems that is different and which connects to this idea is the prosody. We're all Australians now has consistent end rhyme and rhythm and flows really well.This is in complete juxtaposition to Server's choice of prosodic elements, which has no consistency and appears as rebellious, unconventional and abrupt as the message itself. They are representative of what the poets are trying to portray – while Patterson is depicting a perfect, naturally occurring team environment, where everyone gets along instantly and operations and relationships flow smoothly, Servos is displaying a struggle to obtain this acceptance, a struggle which is filled with bumps, lumps and plenty of twists, similar to the mood created by the irregular number of syllable s and incidental rhyme.This may be owing to the experiences of each respective poet. Patterson writes about the Battle of Galileo, in a highly dampened manner, as indicated by the reference to Gab Tepee hill, which is a hill Just south of Anza Cove. While he served in the First World War, it was not at Galileo, but rather on the Western Front, meaning essentially that he never actually witnessed exactly what it was he was writing about (University of Sydney).On the other hand, Server's poems often, among other things, contain confronting, realistic autobiographical content. An example of another of these poems is childhood in Richmond, where in fact he is describing his own childhood as a fight for recognition â€Å"and a bag/ full of dreams†; nobody calls me a hog anymore appears to be based on a similar concept (De Wright). The term Hog' is used in Australian English to describe foreigners, particularly Mediterranean Europeans. The poet is a Greek Australian, born in Melbou rne to Greek parents.It is likely then that this poem describes his own experience, an idea strongly reinforced by his referral to himself and the use first- person point of view, both of which are lacking in the other poem: â€Å"And I said, Australia, hey! ‘/You can call me Kimonos! â€Å". All these factors allow him to not only better describe the situation, but to relate to the audience better. The oscillation between first and second person connotes the author's deep desire for dialogue, conversation achieved through the use of pharmacopoeia.Also emphasizing this idea are the forms of figures of speech present in each poem. We're all Australians now has a lot of tropes such as metaphors, personification and metonymy to embellish and moderate intentions; for example, the lines â€Å"the mettle that a race can show/is roved with shot and steel† display metonymy, replacing guns or weapons with the phrase â€Å"shot and steel†, which essentially means the bul lets and the blades; it is a way of euphemistic the otherwise painful message and making the scene a little bit milder than it actually is.On the contrary, nobody calls me a hog anymore is blunter and to the point, instead using figures of sound such as schism's, napoleon and gausses in order to persuade the reader of the point. Patterson and Servos are describing two different scenarios in their poems – while Patterson is discussing the resistances provided by war which instantly heal any interstate dissentions, Servos is essentially portraying the personal fight and victory that he had against racism.Throughout We're all Australians now, the quelling of competition between states when faced with war is a common theme, shown particularly well in the line â€Å"We're not state children anymore†. This line personifies â€Å"the state† as motherly and then quickly brushes over the simplicity of detachment from one's state to instead form a nation. Another part of the poem recites â€Å"For English, Scotch and Irish-bred/ They're all Australians now! At the time in which this poem was set, Australia was a young nation of Just 14 years, so the English, Scotch and Irish are not necessarily literally those nationalities (though for many people of the time, it would have been), but more likely their heritage, including the quintessentially Aboriginal one. On the other hand, Servos, as stated earlier, is depicting a constant struggle, a fight for his own personal acceptance. He attempts to connect with the audience and Australians in order to achieve this.He also describes parts of his struggles in the first half of the memo. For example, gausses is used in the lines â€Å"Point the finger accusingly/Thump my fist demandingly', in order to describe the escalation of moods. He Jumps from peaceful accusations to semi-violent measures within the space of two lines as the anger boils up. Overall, the poets have each drawn upon their own personal exp eriences in order to spin the webs of aesthetic features that readers still enjoy today.Be it Patterson third-hand experience, comparing the Western Front of the Great War to the Battle of Galileo, or the personal story told by Kimonos Servos of he struggle against racist attitudes, the poems leave a lasting message that shall be forever remembered; Australian metathesis is real, a sense of acceptance seen nowhere else in the world does exist, forming indestructible bonds of helpfulness and tolerance.

Tuesday, July 30, 2019

My Goals for Introductory Psychology Essay

It is my hope that this introduction into psychology will open new ways of understanding how our minds work and the impact our mental processes have on our everyday lives. My goal is to learn how to become a more insightful reader and thinker across disciplines so that I can apply this new knowledge to practical issues in a thoughtful and educated manner. My initial goal is to become a critical reader of our course readings. In order to accomplish this I am going to change my reading habits by utilizing an active approach, including highlighting, note-taking, and asking questions when I am not clear. By tracking my reading and keeping the information organized in my notes I will have direct access to my thoughts about a psychological issues. Specifically, I will maintain a detailed bank of information to draw from when I need to study for a paper or an exam. This alone will be immensely helpful in putting a halt to my current procrastination method and will open up new ways of learning about our mental applications. I will be able to track my progress by how well I retain the information I am reading and by how well I am able to implement this knowledge into practical situations, whether settling an argument, planning my future, or developing personal relationships. I am very comfortable accessing and utilizing computer based texts to help me gather information. On-line quizzes are helpful in testing general knowledge and they point out areas that are in need of improvement. I also follow links to study aids and suggested websites because they often provide detailed information about specific topics as opposed to the general information provided in some textbooks. In addition, Wiki pages and hyperlinked text pages can offer many different lines of inquiry. For example, when I am studying about Freud, I can follow through to pages that are specifically oriented to the id, ego, and superego. Furthermore, I can follow these links to pages about the subconscious or to pages about his notions concerning dreams, desires, and impulses. I am hoping that this course will shed light on the way people act as we do. I am interested in discovering some of my root motivations for holding certain attitudes and beliefs, for example what types of pre-conceived ideas I hold about strangers, or how I react to the way people judge me without fully knowing my personality. I feel that the more we can understand our impulses and desires the more we can direct our energy toward our ideal selves; this psychological basis will be a key to this approach. Being a critical thinker will open these pathways to understanding by incorporating various psychological perspectives to complement my knowledge up to this point. Instead of simply taking things at face value, I will be able to apply my critical knowledge to my everyday life in a more nuanced and balanced understanding.

Monday, July 29, 2019

Benefit and Disadvantagers of Internet

For them, it can enormously help their studies. According to Allen B. Ury (2011), for doing high school or college research, Internet is an essential tool. We can find valuable material on practically any subject within minutes if not seconds by skillfully using Internet search engines and subject directories. By knowing how to effectively search for and cite reputable Web sites can be an essential part of their academic success for those students who taking courses online. As mentioned by Rahul Pandita (2011), Internet has proved to be one of the most innovative inventions for us. It has made its presence felt in every sphere of our life, be it economy, society, health care, spirituality, etc. Prominent among its benefits is the impact it has had on the education sector. Rahul Pandita (2011) also said that students can now gain access to innumerable research papers, apart from getting latest updates in the field of science, technology and almost everything in conjuction of education. But as they say, â€Å"With great power comes great responsibility†, Internet has created new challenges for the society and most threatening among these is the impact it has had on student and children. Young people love to use computers rather than read a book. Web pages  are much more up-to-date than old text books that were previously used for studying, so not only is the information accurate, but it is also designed to engage  students  in a way that they find entertaining. The Internet also allows  students  to research and learn about topics that would previously be unknown to them due to lack of resources. Some schools do not  provide  every single book on a specific subject, but with the Internet, the learning possibilities are limitless, everything is just in their finger tips. The purpose of this task is to discuss about â€Å"The benefits and detrimental effects of Internet on students†. The benefits of internet to student There a few of benefits of internet toward the student : i. A tool to gain information. These days, student’s life without internet is very difficult. They do a lot of work by using the internet especially in searching for information. This is because, gaining information from internet is much more easier than those old books, it can shorten our time. Get online information is the freest way in the world. Nowadays, people need to understand more and more. They want to know the newest news. According to Jayashree Parhare (2011), any kind of information is available on the internet as long as on it is any topic under the sun is. It can be done by using the search engines such as Google, Yahoo are at your service on the internet. There is huge amount of information available on the Internet for just about every subject known to man, ranging from government law and services, trade fair and conference, market information, new ideas and technical support, the list is simply endless. According to Ashwini Ambekar (2008), students can use this wealth of information to learn new things about the subjects they are interested in and for their school projects or research and it is particularly relevant. In addition, this internet is a blessing for many schools and universities that are now able to accede projects and work to the students and follow their progress which is can be easily posted on the school or university websites So, since internet provides almost everything, students can use it to help them or to make their work easier on doing research or looking for any information. i. Communication. Communication is very important to a student, and internet one of the way that make student’s communication easier and faster. As a student, they need to see their lecturers, send or submit their task and assignment by hand, call someone by using cellphone which is wasting their money, time and energy. With internet has opened up new avenues for communication, acc ording to Ashwini Ambekar (2008), email facility let people to communicate with somebody with minimum wastage of time. As Matt Remley (2010) said in his article, It is now possible to send an instant message and also voice messaging to any part of the world through a simple email address and the message is delivered in a matter of seconds. According to Stephen Cook (2008), by using the Internet, there are many type of ways that people can get connected with one another. For examples, email, chat, forums, social networking sites, and real-time  video chat websites. Stephen Cook (2008) also mentioned that the Internet is truly spectacular in how it allows us to get in touch with one another which is you can easily talk to anybody on the other side of the world. With this kind of facilities, students will have more time to do other works rather than finish their time on something that can waste their time. iii. Online services. Online service is one of the greatest benefit of internet towards the student. It can make student’s life easier. There are many types of online services, for example online shopping, online banking and others. Online banking is very useful, according to Edward James (2010), you can access your account within 5 minutes, make a payment, request a cheque book. It is not only for those who doing businesses only, but also to anybody who has an account saving. Furthermore, we can set up direct debits and standing orders, cancel direct debits and standing orders, view historic statements. The list is endless. The best part of it is according to Cody Hodge (2010), when you do your banking online, you are going to skip the drive and just get a phone call after submitting a query to the bank. What sounds easier to you is we don’t have to wasting our lunch hour to go to the bank. Next, according to Ram Gupta (2012) in his article, when online shopping was introduced, shoppers feel that involving themselves in it is a risky affair and uncomfortable to reveal their personal information such as credit cards details. But today, things have change and shoppers became confident to use it and get anything under the sun after realize the benefit of it especially to students. There are a few advantages of online shopping according to Mansi Chitranshi  (2009), online services give you variety of choice and also offers us an extensive range of selection. Not only that, but it also available for 24 hours a day which lets you shop anytime, this is very meaningful to student since time is very precious to them. Last but not lease, Mansi Chitranshi (2009) also said that you can find radically lower prices and cheapest deals with online purchasing. iv. Entertainment According to Kaiz Karen (2009), on internet we can search all types of entertainment from watching films to playing games online. Almost anyone can find the right kind of entertainment for themselves according to their taste. When people surf the internet, there are numerous things that can be found on it. Start from music, hobbies, news and more can be found and shared on the Internet. The best part of it which is love by the students is there are numerous games that can be downloaded from the Internet for free without any charge at any time. As Vibhuti Arora (2006) said we can read those funny e-mails from friends or that have been provided by the internet. Not only that, but you can make all your friends around the world laugh. Even if you are not good at cracking jokes, you can simply download them from the internet and forward them to your friends. This kind of entertainment is important to a student. The detrimental effects of the Internet on students i. Web Addiction. Many students find that internet help them a lot in conjunction of helping them to make their learning easier or use it as a tool to find some information. But without noticing, they are actually wasting their time. According to Joanna, Melinda smith and Lawrence Robinson (2012) in their article, people who in unpleasant feelings such as stress, loneliness, depression, and anxiety, they will turn to the internet just to make them feel better. Joanna, et al. 2012) also stated that the Internet can be an easily accessible outlet when you have a bad day and or to quickly relieve stress or self-soothe or are looking for a way to escape your problems. Losing yourself online can temporarily make feelings such as loneliness, stress, anxiety, depression, and boredom evaporate into thin air and it will definitely drag your time. Lately, internet has provided many social networks such as Facebook, Myspace, Twitter, Blogs and others. This kind of social networks can drag student’s time a lot because when we sign-in into it, they will get stuck on it. According to Jane Demerica (2009), many people that sign up for the internet find themselves spending endless hours chatting, surfing or â€Å"pimping out† their social networks page. This is an unhealthy addiction and you should probably force yourself to get out of the chair and walk away for a few hours. According to Abhijit Naik (2011) in his article about Facebook addiction, facebook provide new friends, games, event plans and many more. While all these activities are enjoyable, you will forget that you have an actual life to live at times you get so used to them. The time you forget about the fact and start spending your precious time on online, then neglecting yourself as well as people around you, and that mean you are now suffering from this addiction disorder without you notice it. Jane Demerica (2009) also said that, This kind of behavior will disorganize student’s life especially on their schedule. This can lead to unhealthy life for example they will late for their meals which is very important to them, they will be fibrous or not-well taken care because they are too busy with the internet. Last but not lease, as mentioned by Deepa Kartha (2010), student are going ignore their study and it can lead to poor performance at university. ii. Pornography. Jayashree Pakhare said in his article that â€Å"pornography is perhaps the biggest disadvantage of internet. It allows you to access and download millions of pornography photos, videos and other X-rated stuff. Such unrestricted access to porn can be detrimental for children and teenagers. It can even play a havoc in marital and social lives of adults especially to students† (2011). Studies have shown that almost every men and most women have been exposed to pornography as told by Lifesitenew. com (2002). According to Elisbeth Deffner (n. d. ), there were plenty of opportunities for people to view pornographic images or read pornographic material before the Internet became so prevalent which from videos, magazines, and books. But as for now, people can easily access pornographic Web sites in the privacy of their own homes. It’s part of a larger issue called â€Å"sexual addiction,† which is â€Å"any kind of sexual behavior that a person continues to engage in despite negative consequences† says Dr. Omar Minwalla, the clinical supervisor at the Sexual Recovery Institute in Los Angeles. Pornography is like drugs, once we get use to it, we will definitely get addicted by it and for sure will give many disadvantages toward the students. According to Joanna, et al. (2012), students can adversely affect real-life relationships, career, and emotional health by compulsively spending hours on the Internet viewing pornography or engaging in other cybersex activities. It could increase the percentage of misbehavior and these leads to adultery, free sex, and even worst child abandonment. As mention by Rahul Pandita (2011), it can cause them to became either sexually-deviant or sexually-addictive, these phenomenon also course the increase of prevalence sexually transmitted diseases among teenagers especially to a student. He also mentioned that the pornography that is present on the Internet promotes irresponsible sex and creates false notions in the minds of students. According to Stephen Rampur (n. d. ), Individuals who are addicted to this type are mostly teenagers and youngsters. It can have an adverse effect on a child’s attitude towards relationships. People who are addicted to online pornography spend hours watching or downloading porn. iii. Reduced Physical Activity According to Rahul Pandita (2011), since internet provides a lot of games and available to play, it has made most student to shut all outdoor activity. If students are lack of physical activity, they can easily fall prey to a lot of lifestyle related diseases for example obesity, apart from failing to develop interpersonal skills. Rahul Pandita (2011) also mentioned that by sitting continuously in front of a computer screen fot couple of hours can seriously and put a strain on our neck and shoulders and damage our eyes. These factors can create life-long problems for them. As Leena Palande (2011) said, when students are busy with the internet, they will definitely lack of exercise and it is the main morbid obesity causes. student spend most of their time in front of the the computer playing video games or computer games and chat day and night, surfing on the Internet which can lead to possibility of gaining weight. Leena Palande (2011) also mentioned, not only student, Even adults also have to spend most of their time in front of a computer, since computers have become an invariable part of every profession, business, organization and education. Use of machines in every field has reduced physical activity significantly. According to Vinci rufus (n. d. ), students are tent to spend a couple of hours in front of the monitor non-stop and not going out could also cause social problems, the most bad part of it,it will make us shy and introvert. Those who stuck to their machines all day aren’t getting any exercise. As such their bodies start to be fail, especially when they opt for quick-fix meals that aren’t terribly nutritious. This extends to personal hygiene, as well, as we tend not to notice our own stink, said by Matt Bird (2009). v. Cyber-crime Cyber or internet crime can affect students’ life. There has never been a set in stone definition of cybercrime. According to Charlotte Raynor Piiggush (2008), the easiest way to difine cybercrime is any illegal activity done through or by using the internet or on the computer. Uttara Manohar (2011) also defined in his article that internet crime is a recently es calating form of crime that started with the rise of the Internet era. Any criminal activities, which is carried out through the Internet or by means of the Internet, is generally termed as Internet crime. According to Uttara Manohar (2011), there are a few types of internet crime. Here is the example of the criminal activity that indirectly can make students life chaotic. First is hacking, hacking is a process where someone attempts to exploit the security settings of a computer system is known as hacking. The hackers can hack into several websites or personal accounts and threaten the security on the Internet. Every day, students are expose to it, email to a student is a must. Sometimes, by using email is one of the way of hacking. According to M. J. Joachim (2010), Hackers use email addresses to change computer codes, often sending out messages with attachments that read and detect personal information, this always happen to students when are transferring things like bank account numbers, passwords and all sorts of personal information that they use for their own purposes. It is not uncommon for hackers to change passwords of their victim’s private Internet accountssuch as facebook account, email and others, making it impossible for victims to access their own information, simply by obtaining an email address from their prey. Another cyber crime is viruses. As mentioned by Shashank Nakate (2012), These are computer programs which have the potential to harm and give damage to a computer system. According to M. J. Joachim (2010) also said viruses cause millions of dollars in damage, lost data and computer contamination each year. A simple email address is all it takes for savvy cyber criminals to implant dangerous viruses and spread them throughout the Internet. Suggestion Eventhough internet gives us a lot of pleasure and make our life easier, but there will always the side effect of it. If we did not monitor it properly and carefully, it will definitely make us suffer one day and then give damages to our life especially to a student. Since students is one of the biggest user of internet, they are the person who easily receive the impact. Thus, it is very important to them to know how to cope and avoid these problem. Here is some suggestion on how to combat it. i. Internet addiction One of the biggest problem of internet is web addiction. Internet can drag our time unnoticeable. As mentioned by Elizabeth Hartney (2011), one of the way is by knowing the symptoms of Internet addiction. Knowledge is the greatest thing, and knowing all the symptoms of internet addiction will make you to evaluate your own online behavior and be aware of any symptoms that might be dragging your time. Elizabeth Hartney (2011) also emphasize to monitor your own internet usage and behavior. keep track of your internet behavior with my internet tracking form. Use the guidelines that come with it to evaluate your own internet behavior, not what you see or believe other students are doing. Drea Christopher (2010) propose to learn to limit your time carefully by keeping a timer by the computer and only allow yourself a limited amount of hours to spend on the Internet each day or week. ii. Pornography Since porn becoming more easily available through the Internet, some people may struggle with an addiction to it. So, it is very important to student to avoid it because if they continue with it, it will ruin their physical and also health. According to Katy Linsao, et al (2012) there are a few step on how to avoid it. First, make sure that you know that you are an addict. Then, find something else to do to occupy your time and mind, it is because you will not think about porn. You can manage it by going somewhere or spend time with friends. Katy et. Al. (2012) also mentioned, the best part of it is by find a support group or get qualified therapist who can provide guidance. According to Abdul Malik (2011), make sure that you are surfing web when others are around. iii. Reduced Physical Activity Since students relay so much on internet, they are tent to spend a lot of time with. Without noticing that they are actually wasting their time. But, the bad part of it is it can affect student physical problems or health. So it is very important to them to avoid it so because prevent is better that cure. There are many ways to overcome it. First, get yourself busy with other activties rather than finish your time on the internet, such as going for a movie with your friend, sports and others. Socializing is very important. The most important of it is, get some exercise to make yourself fit or get sweet. You also can have a hobby such as playing football, badminton, swimming and others. With it, it will divert your attraction from internet. Because if we spend continuously on the internet, we might get obesity. iv. Cyber crime Many students involve in internet crime and it affect them very much. They can take measures to decrease their risk of becoming the victim of cybercrime by adhering to a few simple Internet usage ways of rules. First, you must always remember to log off and shut down your computers when they are not being used. Cyber criminals often scan networks searching for â€Å"always on† computers, which they consider readily accessible and unattended targets. By minimizing the amount of time computers are powered on and connected to the Internet, people can reduce their vulnerability to hacking attacks. (Scot Huntsberry 2012) Next, Scot Huntsberry (2012) mentioned that users have to install and maintain both antivirus and firewall programs. These applications serve as a first line of defence against viruses and other malicious computer programs designed to circumvent security features within computers’ operating systems. Additionally, operating system developers regularly release updates or â€Å"patches. To increase your computer’s security, you should install these updates as soon as they become available in order to avoid cyber crime. users should never open or download email attachments from unknown senders because cyber criminals frequently disguise malicious software as images or documents attached to email messages. ( 3327 words ) Reference 1. Abhijit Naik, (2011). Facebook Addiction. [Online]. Available: http://www. buzzle. com/articles/facebook-addiction. html 2. Abdul Malik Mujahid (2011). 29 Tips for teen on how to handle Pornography. [Online]. Available: http://www. oundvision. com/info/life/porn/15tips. asp 3. Allen B. Ury, (2009). How To Do Research On The Internet. [Online]. Available: http://news. everestonline. edu/post/2009/07/research-on-the-internet 4. Ashwini Ambekar, (2008). Advantages and Disadvantages of the Internet. [Online]. Available: http://www. articleswave. com/computer-articles/advantages-and-disadvantages-of-the-internet. html 5. Charlotte Raynor Piiggush, (2008). What is cyber crime. [Online]. Available: http://www. helium. com/items/1179046-cybercrime-internet-internet-crime-computer-crime-computer 6. Cody Hodge, (2010). Advantages Of internet Banking. [Online]. Available: http://www. helium. com/items/1926616-advantages-of-internet-banking 7. Deepa Kartha, (2010). Computer Addiction. [Online]. Available: http://www. buzzle. com/articles/computer-addiction. html 8. Edward James, (2010). The Advantages Of The Internet. [Online]. Available: http://www. helium. com/items/1860355-the-advantages-of-the-internet 9. Kaiz Kairen, (2009). 10 Most Comman Uses Of Internet. [Online]. Available: http://www. sooperarticles. com/internet-articles/10-most-common-uses-internet-19405. html 10. Jayashree pakhare, (2011). Advantages and Disadvantages of the Internet. [Online]. Available: http://www. buzzle. com/articles/advantages-disadvantages-internet. html 11. Jane Demerica, (2009). Negative Effects of the Internet. [Online]. Available: http://www. helium. com/items/1357121-negative-effects-of-the-internet 12. Joanna Saisan, et al. (2012). Internet and Computer Addiction. [Online]. Available: http://www. helpguide. org/mental/internet_cybersex_addiction. htm 13. Katy Linsao et. Al. (2012). How to deal with porn addiction. [Online]. Available: http://www. wikihow. com/Deal-With-Porn-Addiction 14. Leena Palande, (2011). Morbid Obesity Causes. [Online]. Available: http://www. buzzle. com/articles/morbid-obesity-causes. html 15. Elisabeth Deffner (n. d. ). The Pornography Problem. [Online]. Available: http://www. listenmagazine. org/article/37/archive/the-pornography-problem 16. Lifesitenews. com, (2002). Study Proves â€Å"Pornography Is Harmful†. [Online]. Available: http://www. lifesitenews. com/news/archive//ldn/2002/mar/02031203 17. Matt Bird, (2009). Negative effect of the Internet. [Online]. Available: http://www. helium. com/items/1494952-negative-effects-of-the-internet 18. Mansi Chitranshi, (2009). Benefits of Shopping Online. [Online]. Available: http://www. articleswave. com/shopping-articles/benefits-of-shopping-online. html 19. Matt Remley, (2010). The Advantages Of The Internet. [Online]. Available: http://www. helium. com/items/1938399-advantages-of-the-internet 20. M. J. Joanchim, (2010). Internet email crime and security information. [Online]. Available: http://www. helium. com/items/1952123-cyberstalking-email-crime-internet-crime-fraud-identity-theft-internet-crime-prevention 21. Rahul Pandita, (2011). Negative Effects of Internet on Children. [Online]. Available: http://www. buzzle. om/articles/negative-effects-of-the-internet-on-children. html 22. Ram Gupta, (2012). Real Benefits Of Online Shopping. [Online]. Available: http://article-niche. com/launch/Real-Benefits-Of-Online-Shopping. htm 23. Scot Huntsberry, (2012). Avoid Becoming a Victim of Cybercrime. [Online]. Available: http://www. freedomfromfearmagazine. org/index. php? option=com_content;view=article;id=310:avoid-becoming-a-victim-of-cybercrime;catid=50:issue-7;Itemid=187 24. Stephen Cook, (2010). The Advantages Of The Internet. [Online]. Available: http://www. helium. com/items/1941715-the-advantages-of-the-internet 5. Shashank Nakate, (2012). Advantages and Disadvantages of email. [Online]. Available: http://www. buzzle. com/articles/advantages-and-disadvantages-of-email. html 26. Uttara Manohar, (2011). Internet Crime. [Online]. Available: http://www. buzzle. com/articles/internet-crime. html 27. Vinci Rufus, (n. d. ). Computer And Video Games: The Pros and Cons. [Online]. Available: http://www. buzzle. com/editorials/2-27-2004-51038. asp 28. Vibhuti Arora (2006). 10 Good things about the internet. [Online]. Available: http://gulfnews. com/life-style/people/10-good-things-about-the-internet-1. 24548 . . Benefit and Disadvantagers of Internet For them, it can enormously help their studies. According to Allen B. Ury (2011), for doing high school or college research, Internet is an essential tool. We can find valuable material on practically any subject within minutes if not seconds by skillfully using Internet search engines and subject directories. By knowing how to effectively search for and cite reputable Web sites can be an essential part of their academic success for those students who taking courses online. As mentioned by Rahul Pandita (2011), Internet has proved to be one of the most innovative inventions for us. It has made its presence felt in every sphere of our life, be it economy, society, health care, spirituality, etc. Prominent among its benefits is the impact it has had on the education sector. Rahul Pandita (2011) also said that students can now gain access to innumerable research papers, apart from getting latest updates in the field of science, technology and almost everything in conjuction of education. But as they say, â€Å"With great power comes great responsibility†, Internet has created new challenges for the society and most threatening among these is the impact it has had on student and children. Young people love to use computers rather than read a book. Web pages  are much more up-to-date than old text books that were previously used for studying, so not only is the information accurate, but it is also designed to engage  students  in a way that they find entertaining. The Internet also allows  students  to research and learn about topics that would previously be unknown to them due to lack of resources. Some schools do not  provide  every single book on a specific subject, but with the Internet, the learning possibilities are limitless, everything is just in their finger tips. The purpose of this task is to discuss about â€Å"The benefits and detrimental effects of Internet on students†. The benefits of internet to student There a few of benefits of internet toward the student : i. A tool to gain information. These days, student’s life without internet is very difficult. They do a lot of work by using the internet especially in searching for information. This is because, gaining information from internet is much more easier than those old books, it can shorten our time. Get online information is the freest way in the world. Nowadays, people need to understand more and more. They want to know the newest news. According to Jayashree Parhare (2011), any kind of information is available on the internet as long as on it is any topic under the sun is. It can be done by using the search engines such as Google, Yahoo are at your service on the internet. There is huge amount of information available on the Internet for just about every subject known to man, ranging from government law and services, trade fair and conference, market information, new ideas and technical support, the list is simply endless. According to Ashwini Ambekar (2008), students can use this wealth of information to learn new things about the subjects they are interested in and for their school projects or research and it is particularly relevant. In addition, this internet is a blessing for many schools and universities that are now able to accede projects and work to the students and follow their progress which is can be easily posted on the school or university websites So, since internet provides almost everything, students can use it to help them or to make their work easier on doing research or looking for any information. i. Communication. Communication is very important to a student, and internet one of the way that make student’s communication easier and faster. As a student, they need to see their lecturers, send or submit their task and assignment by hand, call someone by using cellphone which is wasting their money, time and energy. With internet has opened up new avenues for communication, acc ording to Ashwini Ambekar (2008), email facility let people to communicate with somebody with minimum wastage of time. As Matt Remley (2010) said in his article, It is now possible to send an instant message and also voice messaging to any part of the world through a simple email address and the message is delivered in a matter of seconds. According to Stephen Cook (2008), by using the Internet, there are many type of ways that people can get connected with one another. For examples, email, chat, forums, social networking sites, and real-time  video chat websites. Stephen Cook (2008) also mentioned that the Internet is truly spectacular in how it allows us to get in touch with one another which is you can easily talk to anybody on the other side of the world. With this kind of facilities, students will have more time to do other works rather than finish their time on something that can waste their time. iii. Online services. Online service is one of the greatest benefit of internet towards the student. It can make student’s life easier. There are many types of online services, for example online shopping, online banking and others. Online banking is very useful, according to Edward James (2010), you can access your account within 5 minutes, make a payment, request a cheque book. It is not only for those who doing businesses only, but also to anybody who has an account saving. Furthermore, we can set up direct debits and standing orders, cancel direct debits and standing orders, view historic statements. The list is endless. The best part of it is according to Cody Hodge (2010), when you do your banking online, you are going to skip the drive and just get a phone call after submitting a query to the bank. What sounds easier to you is we don’t have to wasting our lunch hour to go to the bank. Next, according to Ram Gupta (2012) in his article, when online shopping was introduced, shoppers feel that involving themselves in it is a risky affair and uncomfortable to reveal their personal information such as credit cards details. But today, things have change and shoppers became confident to use it and get anything under the sun after realize the benefit of it especially to students. There are a few advantages of online shopping according to Mansi Chitranshi  (2009), online services give you variety of choice and also offers us an extensive range of selection. Not only that, but it also available for 24 hours a day which lets you shop anytime, this is very meaningful to student since time is very precious to them. Last but not lease, Mansi Chitranshi (2009) also said that you can find radically lower prices and cheapest deals with online purchasing. iv. Entertainment According to Kaiz Karen (2009), on internet we can search all types of entertainment from watching films to playing games online. Almost anyone can find the right kind of entertainment for themselves according to their taste. When people surf the internet, there are numerous things that can be found on it. Start from music, hobbies, news and more can be found and shared on the Internet. The best part of it which is love by the students is there are numerous games that can be downloaded from the Internet for free without any charge at any time. As Vibhuti Arora (2006) said we can read those funny e-mails from friends or that have been provided by the internet. Not only that, but you can make all your friends around the world laugh. Even if you are not good at cracking jokes, you can simply download them from the internet and forward them to your friends. This kind of entertainment is important to a student. The detrimental effects of the Internet on students i. Web Addiction. Many students find that internet help them a lot in conjunction of helping them to make their learning easier or use it as a tool to find some information. But without noticing, they are actually wasting their time. According to Joanna, Melinda smith and Lawrence Robinson (2012) in their article, people who in unpleasant feelings such as stress, loneliness, depression, and anxiety, they will turn to the internet just to make them feel better. Joanna, et al. 2012) also stated that the Internet can be an easily accessible outlet when you have a bad day and or to quickly relieve stress or self-soothe or are looking for a way to escape your problems. Losing yourself online can temporarily make feelings such as loneliness, stress, anxiety, depression, and boredom evaporate into thin air and it will definitely drag your time. Lately, internet has provided many social networks such as Facebook, Myspace, Twitter, Blogs and others. This kind of social networks can drag student’s time a lot because when we sign-in into it, they will get stuck on it. According to Jane Demerica (2009), many people that sign up for the internet find themselves spending endless hours chatting, surfing or â€Å"pimping out† their social networks page. This is an unhealthy addiction and you should probably force yourself to get out of the chair and walk away for a few hours. According to Abhijit Naik (2011) in his article about Facebook addiction, facebook provide new friends, games, event plans and many more. While all these activities are enjoyable, you will forget that you have an actual life to live at times you get so used to them. The time you forget about the fact and start spending your precious time on online, then neglecting yourself as well as people around you, and that mean you are now suffering from this addiction disorder without you notice it. Jane Demerica (2009) also said that, This kind of behavior will disorganize student’s life especially on their schedule. This can lead to unhealthy life for example they will late for their meals which is very important to them, they will be fibrous or not-well taken care because they are too busy with the internet. Last but not lease, as mentioned by Deepa Kartha (2010), student are going ignore their study and it can lead to poor performance at university. ii. Pornography. Jayashree Pakhare said in his article that â€Å"pornography is perhaps the biggest disadvantage of internet. It allows you to access and download millions of pornography photos, videos and other X-rated stuff. Such unrestricted access to porn can be detrimental for children and teenagers. It can even play a havoc in marital and social lives of adults especially to students† (2011). Studies have shown that almost every men and most women have been exposed to pornography as told by Lifesitenew. com (2002). According to Elisbeth Deffner (n. d. ), there were plenty of opportunities for people to view pornographic images or read pornographic material before the Internet became so prevalent which from videos, magazines, and books. But as for now, people can easily access pornographic Web sites in the privacy of their own homes. It’s part of a larger issue called â€Å"sexual addiction,† which is â€Å"any kind of sexual behavior that a person continues to engage in despite negative consequences† says Dr. Omar Minwalla, the clinical supervisor at the Sexual Recovery Institute in Los Angeles. Pornography is like drugs, once we get use to it, we will definitely get addicted by it and for sure will give many disadvantages toward the students. According to Joanna, et al. (2012), students can adversely affect real-life relationships, career, and emotional health by compulsively spending hours on the Internet viewing pornography or engaging in other cybersex activities. It could increase the percentage of misbehavior and these leads to adultery, free sex, and even worst child abandonment. As mention by Rahul Pandita (2011), it can cause them to became either sexually-deviant or sexually-addictive, these phenomenon also course the increase of prevalence sexually transmitted diseases among teenagers especially to a student. He also mentioned that the pornography that is present on the Internet promotes irresponsible sex and creates false notions in the minds of students. According to Stephen Rampur (n. d. ), Individuals who are addicted to this type are mostly teenagers and youngsters. It can have an adverse effect on a child’s attitude towards relationships. People who are addicted to online pornography spend hours watching or downloading porn. iii. Reduced Physical Activity According to Rahul Pandita (2011), since internet provides a lot of games and available to play, it has made most student to shut all outdoor activity. If students are lack of physical activity, they can easily fall prey to a lot of lifestyle related diseases for example obesity, apart from failing to develop interpersonal skills. Rahul Pandita (2011) also mentioned that by sitting continuously in front of a computer screen fot couple of hours can seriously and put a strain on our neck and shoulders and damage our eyes. These factors can create life-long problems for them. As Leena Palande (2011) said, when students are busy with the internet, they will definitely lack of exercise and it is the main morbid obesity causes. student spend most of their time in front of the the computer playing video games or computer games and chat day and night, surfing on the Internet which can lead to possibility of gaining weight. Leena Palande (2011) also mentioned, not only student, Even adults also have to spend most of their time in front of a computer, since computers have become an invariable part of every profession, business, organization and education. Use of machines in every field has reduced physical activity significantly. According to Vinci rufus (n. d. ), students are tent to spend a couple of hours in front of the monitor non-stop and not going out could also cause social problems, the most bad part of it,it will make us shy and introvert. Those who stuck to their machines all day aren’t getting any exercise. As such their bodies start to be fail, especially when they opt for quick-fix meals that aren’t terribly nutritious. This extends to personal hygiene, as well, as we tend not to notice our own stink, said by Matt Bird (2009). v. Cyber-crime Cyber or internet crime can affect students’ life. There has never been a set in stone definition of cybercrime. According to Charlotte Raynor Piiggush (2008), the easiest way to difine cybercrime is any illegal activity done through or by using the internet or on the computer. Uttara Manohar (2011) also defined in his article that internet crime is a recently es calating form of crime that started with the rise of the Internet era. Any criminal activities, which is carried out through the Internet or by means of the Internet, is generally termed as Internet crime. According to Uttara Manohar (2011), there are a few types of internet crime. Here is the example of the criminal activity that indirectly can make students life chaotic. First is hacking, hacking is a process where someone attempts to exploit the security settings of a computer system is known as hacking. The hackers can hack into several websites or personal accounts and threaten the security on the Internet. Every day, students are expose to it, email to a student is a must. Sometimes, by using email is one of the way of hacking. According to M. J. Joachim (2010), Hackers use email addresses to change computer codes, often sending out messages with attachments that read and detect personal information, this always happen to students when are transferring things like bank account numbers, passwords and all sorts of personal information that they use for their own purposes. It is not uncommon for hackers to change passwords of their victim’s private Internet accountssuch as facebook account, email and others, making it impossible for victims to access their own information, simply by obtaining an email address from their prey. Another cyber crime is viruses. As mentioned by Shashank Nakate (2012), These are computer programs which have the potential to harm and give damage to a computer system. According to M. J. Joachim (2010) also said viruses cause millions of dollars in damage, lost data and computer contamination each year. A simple email address is all it takes for savvy cyber criminals to implant dangerous viruses and spread them throughout the Internet. Suggestion Eventhough internet gives us a lot of pleasure and make our life easier, but there will always the side effect of it. If we did not monitor it properly and carefully, it will definitely make us suffer one day and then give damages to our life especially to a student. Since students is one of the biggest user of internet, they are the person who easily receive the impact. Thus, it is very important to them to know how to cope and avoid these problem. Here is some suggestion on how to combat it. i. Internet addiction One of the biggest problem of internet is web addiction. Internet can drag our time unnoticeable. As mentioned by Elizabeth Hartney (2011), one of the way is by knowing the symptoms of Internet addiction. Knowledge is the greatest thing, and knowing all the symptoms of internet addiction will make you to evaluate your own online behavior and be aware of any symptoms that might be dragging your time. Elizabeth Hartney (2011) also emphasize to monitor your own internet usage and behavior. keep track of your internet behavior with my internet tracking form. Use the guidelines that come with it to evaluate your own internet behavior, not what you see or believe other students are doing. Drea Christopher (2010) propose to learn to limit your time carefully by keeping a timer by the computer and only allow yourself a limited amount of hours to spend on the Internet each day or week. ii. Pornography Since porn becoming more easily available through the Internet, some people may struggle with an addiction to it. So, it is very important to student to avoid it because if they continue with it, it will ruin their physical and also health. According to Katy Linsao, et al (2012) there are a few step on how to avoid it. First, make sure that you know that you are an addict. Then, find something else to do to occupy your time and mind, it is because you will not think about porn. You can manage it by going somewhere or spend time with friends. Katy et. Al. (2012) also mentioned, the best part of it is by find a support group or get qualified therapist who can provide guidance. According to Abdul Malik (2011), make sure that you are surfing web when others are around. iii. Reduced Physical Activity Since students relay so much on internet, they are tent to spend a lot of time with. Without noticing that they are actually wasting their time. But, the bad part of it is it can affect student physical problems or health. So it is very important to them to avoid it so because prevent is better that cure. There are many ways to overcome it. First, get yourself busy with other activties rather than finish your time on the internet, such as going for a movie with your friend, sports and others. Socializing is very important. The most important of it is, get some exercise to make yourself fit or get sweet. You also can have a hobby such as playing football, badminton, swimming and others. With it, it will divert your attraction from internet. Because if we spend continuously on the internet, we might get obesity. iv. Cyber crime Many students involve in internet crime and it affect them very much. They can take measures to decrease their risk of becoming the victim of cybercrime by adhering to a few simple Internet usage ways of rules. First, you must always remember to log off and shut down your computers when they are not being used. Cyber criminals often scan networks searching for â€Å"always on† computers, which they consider readily accessible and unattended targets. By minimizing the amount of time computers are powered on and connected to the Internet, people can reduce their vulnerability to hacking attacks. (Scot Huntsberry 2012) Next, Scot Huntsberry (2012) mentioned that users have to install and maintain both antivirus and firewall programs. These applications serve as a first line of defence against viruses and other malicious computer programs designed to circumvent security features within computers’ operating systems. Additionally, operating system developers regularly release updates or â€Å"patches. To increase your computer’s security, you should install these updates as soon as they become available in order to avoid cyber crime. users should never open or download email attachments from unknown senders because cyber criminals frequently disguise malicious software as images or documents attached to email messages. ( 3327 words ) Reference 1. Abhijit Naik, (2011). Facebook Addiction. [Online]. Available: http://www. buzzle. com/articles/facebook-addiction. html 2. Abdul Malik Mujahid (2011). 29 Tips for teen on how to handle Pornography. [Online]. Available: http://www. oundvision. com/info/life/porn/15tips. asp 3. Allen B. Ury, (2009). How To Do Research On The Internet. [Online]. Available: http://news. everestonline. edu/post/2009/07/research-on-the-internet 4. Ashwini Ambekar, (2008). Advantages and Disadvantages of the Internet. [Online]. Available: http://www. articleswave. com/computer-articles/advantages-and-disadvantages-of-the-internet. html 5. Charlotte Raynor Piiggush, (2008). What is cyber crime. [Online]. Available: http://www. helium. com/items/1179046-cybercrime-internet-internet-crime-computer-crime-computer 6. Cody Hodge, (2010). Advantages Of internet Banking. [Online]. Available: http://www. helium. com/items/1926616-advantages-of-internet-banking 7. Deepa Kartha, (2010). Computer Addiction. [Online]. Available: http://www. buzzle. com/articles/computer-addiction. html 8. Edward James, (2010). The Advantages Of The Internet. [Online]. Available: http://www. helium. com/items/1860355-the-advantages-of-the-internet 9. Kaiz Kairen, (2009). 10 Most Comman Uses Of Internet. [Online]. Available: http://www. sooperarticles. com/internet-articles/10-most-common-uses-internet-19405. html 10. Jayashree pakhare, (2011). Advantages and Disadvantages of the Internet. [Online]. Available: http://www. buzzle. com/articles/advantages-disadvantages-internet. html 11. Jane Demerica, (2009). Negative Effects of the Internet. [Online]. Available: http://www. helium. com/items/1357121-negative-effects-of-the-internet 12. Joanna Saisan, et al. (2012). Internet and Computer Addiction. [Online]. Available: http://www. helpguide. org/mental/internet_cybersex_addiction. htm 13. Katy Linsao et. Al. (2012). How to deal with porn addiction. [Online]. Available: http://www. wikihow. com/Deal-With-Porn-Addiction 14. Leena Palande, (2011). Morbid Obesity Causes. [Online]. Available: http://www. buzzle. com/articles/morbid-obesity-causes. html 15. Elisabeth Deffner (n. d. ). The Pornography Problem. [Online]. Available: http://www. listenmagazine. org/article/37/archive/the-pornography-problem 16. Lifesitenews. com, (2002). Study Proves â€Å"Pornography Is Harmful†. [Online]. Available: http://www. lifesitenews. com/news/archive//ldn/2002/mar/02031203 17. Matt Bird, (2009). Negative effect of the Internet. [Online]. Available: http://www. helium. com/items/1494952-negative-effects-of-the-internet 18. Mansi Chitranshi, (2009). Benefits of Shopping Online. [Online]. Available: http://www. articleswave. com/shopping-articles/benefits-of-shopping-online. html 19. Matt Remley, (2010). The Advantages Of The Internet. [Online]. Available: http://www. helium. com/items/1938399-advantages-of-the-internet 20. M. J. Joanchim, (2010). Internet email crime and security information. [Online]. Available: http://www. helium. com/items/1952123-cyberstalking-email-crime-internet-crime-fraud-identity-theft-internet-crime-prevention 21. Rahul Pandita, (2011). Negative Effects of Internet on Children. [Online]. Available: http://www. buzzle. om/articles/negative-effects-of-the-internet-on-children. html 22. Ram Gupta, (2012). Real Benefits Of Online Shopping. [Online]. Available: http://article-niche. com/launch/Real-Benefits-Of-Online-Shopping. htm 23. Scot Huntsberry, (2012). Avoid Becoming a Victim of Cybercrime. [Online]. Available: http://www. freedomfromfearmagazine. org/index. php? option=com_content;view=article;id=310:avoid-becoming-a-victim-of-cybercrime;catid=50:issue-7;Itemid=187 24. Stephen Cook, (2010). The Advantages Of The Internet. [Online]. Available: http://www. helium. com/items/1941715-the-advantages-of-the-internet 5. Shashank Nakate, (2012). Advantages and Disadvantages of email. [Online]. Available: http://www. buzzle. com/articles/advantages-and-disadvantages-of-email. html 26. Uttara Manohar, (2011). Internet Crime. [Online]. Available: http://www. buzzle. com/articles/internet-crime. html 27. Vinci Rufus, (n. d. ). Computer And Video Games: The Pros and Cons. [Online]. Available: http://www. buzzle. com/editorials/2-27-2004-51038. asp 28. Vibhuti Arora (2006). 10 Good things about the internet. [Online]. Available: http://gulfnews. com/life-style/people/10-good-things-about-the-internet-1. 24548 . .

Sunday, July 28, 2019

Self-assessment process Essay Example | Topics and Well Written Essays - 2500 words

Self-assessment process - Essay Example Through such a process, I will be in a better position to make a successful career decision. A self assessment process is imperative in understanding my personal inclination towards career and is of considerable importance in making a career choice (Foster 21). Under normal circumstances, the process regards obtaining an understanding of myself in a manner that predisposes me to establishing a credible career choice that reflects my natural abilities. Therefore, before I decide on the job to select, it will be necessary to engage in the self-assessment course that will furnish me with the required knowledge of the career options that suit my natural frame. Areas to be evaluated include personality that represents my emotional and behavioral features, my attitudes towards life that implies how I perceive life’s events, my leadership qualities denoting my ability to exercise the function of authority, team work that regards my ability to work with groups or teams as well as inno vation, which primarily concerns my capacity to develop novel and creative ideas. All these parameters will be part of my comprehensive self-assessment process that will illuminate my impending career choice. ... and throughout my academic process I have learnt the basics of working in a business environment through the ethos of leadership and management gained through the process. As a result, I am well-trained and professionally equipped to tackle the career environment. I am a committed team worker with immense interest in interpersonal communication and interaction, very friendly with people and also a firm believer in collaboration. My personality leans towards aggressive, ambitious and charismatic tendencies because I tend to be more proactive in my approach to issues. Therefore, I have the ability to work effectively with groups because of my personal inclination to socializing, problem solving and collaboration. Owing to my towering personality type, I am an effective leader with credible leadership qualities ranging from decision making, consultation, collaboration, communication, team work and interpersonal skills. My experience in college leadership roles has exposed me to numerous challenges of a leader thus sharpening my already existing leadership profile. Similarly, with regard to experience, I have held several leadership positions throughout my education particularly in college. I am a creative individual who likes experimenting new deals in daily practice. One of my hobbies is trying new things, and my joy lies in the successful implementation of a new idea. I have always liked trying something new ideas (whether it is my own creation or somebody else) although I am acutely imaginative and innovative at a personal level. My greatest motivation for innovation is my firm belief in change, which to me represents an opportunity to do something better and accomplish a goal. I spend a lot of time imagining and developing new frontiers of thought, management and

Long-Term Investment Decisions Research Paper Example | Topics and Well Written Essays - 1000 words

Long-Term Investment Decisions - Research Paper Example Internal factors are the factors that are influenced by the business establishment internally while external factors are factors that affect an investment where the business establishment has no control over. An example of such factors is government involvement. Why Government Regulation is or is not needed Normally, market structures and systems are formed by the various aspects of demand and supply. However, governments intervene in the market systems in various ways. Such ways include taxation, subsidies, allocation of rights, and rules and regulations among others. One reason why the United States of America government intervenes in the market economy is to ensure that there is free and fair competition. This, it does in various ways the notable one being putting various rules and regulation in the market economy. This is especially done to allow new business establishments entry into the market. Major corporations are known to merge or acquire another business establishment in o rder to ensure that they maintain their control over the market. This makes it hard for small business establishments especially new ones to enter the market thus discouraging entrepreneurship which repels investments. Another reason why there is the need for government intervention in the market economy is to ensure that indigenous companies and business establishments are safeguarded. This is especially the case when it comes to the farming industry where the United States of America government offers help to farmers through subsidies and tax exemptions to farmers in order for them to compete with International Corporation, which has an advantage of the farmers in terms of various factors such as availability of cheap labor. There is the need for government’s intervention in the market economy when it comes to goods and services which are sensitive to nature. For example, the government must control the production, sale, and buying of firearms and ammunition since this is a n issue which is sensitive. Another sector that the government intervenes as a necessity due to sensitivity is the provision of public services such as health, water, education, security, and electricity. There is need of government intervention is such instances due to the fact that these are human needs that when left to the private-sector control they might lead to chaos due to various factors. Finally, yet importantly, the government intervenes in a market economy to ensure that it has access to enough revenue to meet the country's needs. This is usually done through taxation where the government influences the market economy in order to generate its revenue. The rationale for the Intervention of Government in the Market Process in the U.S The need for government intervention in economic markets in the United States of America provides the rationale for the government’s involvement in the market process in the country. Firstly, the fact that government intervention in the market process in the United States of America results in social equity is a major motivator for the government to regulate the business processes in America.  Ã‚  

Saturday, July 27, 2019

Research Methods in HRM Essay Example | Topics and Well Written Essays - 2750 words

Research Methods in HRM - Essay Example It is an intended objective of HRM practices, undertaken under the paraphernalia of HRM, that organizational objectives are met. The most sharply defined organizational objective is performance. Performance in turn is expected to improve everything for the organization right from sales to profits. Therefore, in order to fine tune HRM practices frequent research is carried out not only to find out how past HRM practices and policies yielded but also to suggest newly improved HRM practices and policies for implementation. Often a case has been made that HRM research, say directly addressing the issue of employee performance, was conducted at great expense of time, funds and resources however the resultant improvement in employee performance after implementation of the findings of the research was not only not commensurate but grossly inadequate. While it may be possible that implementation schemata may have had serious errors and limitations however primary concern here is to explore i f the HRM research undertaken was able to truly address the HRM issues at hand; whether it oversimplified the research scenario with overbearing and sweeping assumptions; whether it focused on appropriate subjects; if it did collected sufficient data from a sufficiently representative sample(s); if the data analysis was done using correct techniques; if it missed some of the important explanatory variables or even if it was able to formulate and test a contextual research question(s) or hypotheses. These issues are called methodological issues and if ignored can lead to fatally misleading research findings. In the following paragraphs methodological issues connected with HRM research in organizational performance will be examined and discussed. Relationship between HRM and performance A lot of research has been conducted in exploring the relationship between organizational performance and HRM practices. Two broad methodological approaches can be delineated exploring this relationship. One approach is entirely within the domain of strategic HRM and tries to explain this relationship through strategic considerations ranged from external environment to internal strategies of the organization. These approaches explain the link between performance and HRM practices by weaving HRM policies within the overall strategic thrust of the organization (Wright and Snell, 1998).Another approach focuses on universal HR practices which are commonly practiced in most organizations and are such practices are slated to lead to better performance (Delery and Doty, 1996).The strategy woven contingency approach considers human factor as a means in the hand of overall organizational strategy(ies) ,sub serving the purposes of such organizational strategies, and considers HRM practices as an adjunct tool for achievement of strategic objectives. The universalistic school approaches focus on high performance work practices and considers human factor development as an organizational goal by itself. Universalistic approach

Friday, July 26, 2019

The Role of Cognitive and affective conflict in early implementation Essay

The Role of Cognitive and affective conflict in early implementation of activity - based cost management - Essay Example The article is an empirical study of the problems concerning the implementation of activity-based cost management (ABCM), particularly during its introductory phase, as the new system impacts on the behavioural element in the organization. Two conflicts are apparently engendered when ABCM is newly implemented – there is the cognitive conflict and the affective conflict. The study tries to discover empirical evidence, through a survey of 56 senior managers representing as many manufacturing companies that have adopted the use of ABCM in their organizations. Through the use of regression and correlation statistics, the results of the survey are expected to yield insights into the relationship between conflict constructs and the seleted ABCM implementation factors. Through this study, the researcher hopes to gain insight into how manufacturing companies may benefit, financially and operationally, from activity-based cost management, while mitigating the adverse effects and enhanc ing the beneficial effects of behavioural considerations attendant to the change. The title is somewhat long-winded, but it does convey a good idea of the topic of the research study. It conveys the subject of how employees behave when change is introduced in an organization. It also captures the interest of the business student to know more about what activity-based cost management is and why it would result in behavioural conflict. From the point of view of managers, the title immediately hints that this study could provide useful insight into best practices in the management of change, in particular regarding activity-based cost management. The abstract is particularly well written. The dilemma addressed by the study is described in a way that could be easily understood by readers with a reasonable familiarity with business organizations. Hands-on managers

Thursday, July 25, 2019

Martin Luther King's Letter from Birmingham jail Essay

Martin Luther King's Letter from Birmingham jail - Essay Example It was through bold and inspirational speeches that King established a reputation as a great orator. However, this also painted him a radical and subject to federal surveillance for the rest of his life. In addition, King is recognized for his phlegmatic way of approaching crisis as he advocated for the rights of all. Martin Luther King Jr represented the African-American community, but in essence, this translates to all minority communities who lived an oppressed life. This oppression came about following colonization and the slave trade where the rights of those perceived to a weak community were subjected to a wide range of discrimination. Segregation and discrimination with regard to race, gender and education were outlawed following advocacy for civil rights. This marks a critical step towards generating independence among communities. This clearly illustrates that even as King fought for the rights of African-Americans, the benefits would be felt across different communities bo th regionally and nationally. King mounted a challenge to oppression by defying the status quo, which eventually got support from other members of the community other than African-Americans. ... Martin Luther King is no exception as highlighted in most of his speeches and letters, particularly the letter from Birmingham jail, which is the subject of this paper. This paper seeks to illustrate the means of persuasion applied in King’s letter from Birmingham jail. In the wake of his struggles to advocate for equal civil rights, King was arrested for his participation in the Birmingham campaign in Alabama. The campaign was organised by King’s organisation, the Southern Christian Leadership Conference, which saw a series of peaceful demonstrations against segregation. It is following the protests that he was arrested and his actions criticised by clergymen who published a letter terming his actions as unwise. In their letter, the religious leaders disapproved the position taken to hold the demonstrations, which in their view, imposed immerse tension in Birmingham. They also disapproved the timing of the demonstrations since the courts had previously issued an injunc tion to prohibit civil marches in Birmingham streets. The letter from Birmingham jail was in response to the sentiments expressed by the clergymen and aimed at justifying the need for action against prevailing civil injustices. It is in this letter that King employs Aristotle's rhetoric modes of persuasion to counter argument his audience’s recount of events, which appeal to ethos, pathos and logos. In the letter, King defends his reputation and wisdom by illustrating the need for action, which is in line with ethos before trying to arouse the emotions of his audience. He finally presents testimony and quotations from important thinkers and leaders of the time while appealing to the audiences’ logic. The effective

Wednesday, July 24, 2019

Questionnaire for Bachelor Thesis with topic JSR170 and the Content Essay

Questionnaire for Bachelor Thesis with topic JSR170 and the Content Management Industry - Essay Example 17. Specifications are not available for the kind of applications that we use in our company. 4. Technology: Can Conventional Database Abstraction Layers (DBAL) and Web Services be used for solving the same issues 18. DBAL and web services are capable of solving all of the issues listed in section 2. 19. DBAL and Web services solves the relevant issues for us. 20. DBAL is tunable and can be used to realize additional controls that may be needed. 21. Our people are comfortable with DBAL / Web services 22. DBAL and web services are easier to adopt and use than the new standard processes 23. Many of the disadvantages of DBAL / web services are taken care of JSRs and JSRs are growing. Statements Very Un Important (1) Un Important (2) Neutral (3) Important (4) Very Important (5) 5. Technology: Is Data Access more comfortable with JDBC or other Data mining / warehousing software 24. Additional features on JDBC for connecting dissimilar databases. 25. Generic warehousing tools are good enough for our requirements. 6. General: Closing Remarks 26. JSR 170 is the future standard for all kinds of applications from Java stable. 27. JSR 170 is easy to adopt and use. 28. JSR 170 is compatible with most of the Enterprise Content Management Vendor products. 29. JSR 170 has advantages that are better than the other equivalent standards and products. 30. Adopting JSR 170 would improve our performance in the company. Signature of the person filling the form Thanks for your cooperation Question Selection and grouping. Categorization is done on the basis of the following: 1. Size of the company 2. Turnover of the company 3. Nature of business 4. Database employed on the website The...This would help in analyzing the advantages with respect to the size of the company, nature of business, database employed and also on the turnover. This would help in understanding whether the companies of similar traits think alike or differently; if so why Answers to be evaluated in line with the standard evaluation practices of assigning 1 for very unimportant and 5 for very important. Based on these numeric assignments of the choice, the other factors are also evaluated in line with the grouping and the related questions. Answers for specific groups could be averaged and viewed as a relevancy factor for the heading / group from the specific company type / size.

Tuesday, July 23, 2019

Financial Analysis of Tesla Motors Research Paper

Financial Analysis of Tesla Motors - Research Paper Example Tesla Motors, Inc is an automobile company, which was established in the year 2003. The company headquarters is located at Palo Alto, California, in the United States. The company specializes in the design, manufacture, and sale of electric cars and electric vehicle power train components. The Tesla Motors, Inc is presently listed in the National Association of Securities Dealers Automated Quotations. Apart from private investors the Toyota Group, which has a 10% stake in the company and the Daimler Ag, which has a 4.7% stake in the company, also own the company.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One of the most revered products produced by the company is the Tesla Roadster, which was the first fully electric sports car that it produced, followed by the Model S, which is a fully electric luxury sedan. Additionally, the company is also revered for the production of electric power train components such as the lithium-ion battery packs that are normally sold to other automakers such as the Toyota Motor Company and the Daimler Motor Company, which is the manufacturer of the Mercedes Benz brands.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   It is noted that despite being in operation since the year 2003, the company was only able to post its first profits, which was $11.2 million US dollars in the first quarter of 2013. According to the company’s Chief Executive Officer, its plan for the future is to become an independent automaker. with the capability

The Heart and Mind in Decision-Making Essay Example for Free

The Heart and Mind in Decision-Making Essay I chose â€Å"Dear Diary: My Heart is racing to buy a car† to reflect and it seems interesting to me because it is one of the very unusual and common human trait to decide upon the conflict between calls from heart and mind. This is a situation which almost every human faces one day or the other. Jamie had an average financial background though when he saw his dream car he was moved to an extent that he thought of sacrificing his professional and personal needs to live his dream owning a red Mustang with powerful engine sound. It is always challenging to decide upon the conflict that arises because of intuition and logic. I believe a good and influential leader is one who can firmly decide upon the conflict between intuition and logic and takes decisions in interest of oneself and the group of people he is leading. The decision may also be influenced by the values and behavior of particular leader. There should be a sense of balance between two calls which has to be looked upon with all perspective. I was in same dilemma as Jamie when I passed my secondary exam and I was supposed to choose major between math and biology in higher secondary. To overcome the confusion upon the choices I took help from my dad and logically we concluded that I should take math as major and look for career in engineering. The second concept which was underlined throughout the case was that though he was aware of both the pros and cons of buying of both the cars but he tried to seek help from others in deciding rather than sticking to his own decision. A good leader should have the right attitude to seek suggestion upon his/her decision if he/she is being acted upon heart versus mind conflict. A successful leader also seeks suggestion from peer groups for answers. To conclude I believe that mind analyses things logically and strives to arrive at a decision. If the analysis leads to confusion then ask your heart as it is as logical as our mind is. Information is constantly exchanged between them and the decision making depends on a lot of logic in most of the cases. If the mind adds subtracts, the heart multiplies and divides! No wonder the saying listen to your heart when in confusion may holds well at times.

Monday, July 22, 2019

Preston Hall Museum Essay Example for Free

Preston Hall Museum Essay Preston Hall Museum was originally built in 1825 by a solicitor called David Burton Fowler. The museum is situated on the A135, on Yarm Road. In 1828 David Burton Fowler died, and it remained in the Fowler family, until 1882 when his great nephew sold the house for 27,500 to Robert Ropner. The family lived there until the 1920s-30s. During the 1st World War, it was used as a base for safety. Stockton Borough Council bought the house in 1948. In the summer of 1953 the Hall was opened as Stocktons first public museum to commemorate the coronation of H. M. Queen Elizabeth II. The museum was developed later when the service wing was transformed into a Victorian Street of shops with working craftsmen. The museum provides opportunities to visit rooms from the 1880s to 1960s. The museum also offers special displays, events and changing exhibitions. The aims of Preston Hall museum are to provide a service that caters for people; who need educational purposes; interests in the arts; social events e.g. days out and art fairs.  The objectives are the goals set by the businesses; they can be short term, e.g. 1 year, or long term e.g. 5 years. Preston Hall Museum objectives are to provide; educational purposes; better services for schools and people who have interests in the Arts and leisure activities. It also wants to monitor advertisement campaigns. Overall, it wants to provide a better service for the community. The external influences that affect the museum are the opening and closing times. For example, the museum is open on weekdays from 10:00am to 4:30pm. This is a large period of time that students or children are at school and parents are working, meaning that a large part of the target market cant get to the museum, only on school holidays and school visits. Another external influence is the changes in lifestyle, for example a large majority of the younger market have games consoles, e.g. Xbox 360s and Play station 3s, this means that less of the younger market will be interested in the visiting the museum, therefore there will be low profits. Another external influence would be the council and government. Funding from the council and government would mean that the museum could afford to stay open due to the costs for new displays and events and promotional methods. Another of the museum external influence would be the availability of workers, if the museum can find people to work for the museum. Slept analysis  A slept analysis is an internal influence in a business.  Social- The change in lifestyles, for example more people concerned about their physical self and people having games consoles. Other changes in lifestyles could be using the Internet and eating out. Also the pressure groups in the local community e.g. the cleanliness of the museum and an improvement in the service of the museum. A further point would be the competition surrounding the museum, like cinemas, swimming pools and bowling. Legal- Legal influences could be if the museum is complying with laws like employment law. This would mean if the staff at the museum are being treated fairly and equally. Other laws which can be link in with the employment law are: sex discrimination act; males and females should be given the same opportunities in the same job and the disabled at work act; disabled people should have the same chance to work for a business as a person who is not disabled. Legal could often involve trade unions; if a business is treating and providing the staff to an efficient standard, e.g. maternity leave, or legal action will be taken against the business. A further point is the consumer protection law; the museum cant give away any personal details to 3rd parties. The office of fare trading; if the products promoted by a business arent what they claim to be. Economic VAT can affect the museum, so if VAT is added to prices the consumers will have to pay higher prices for the products. Excise duties will affect a business through what profit it makes and the prices of their products. Excise duties are taxes charged on products produced in the country. Corporation tax is a tax on a companys profits- if they are limited companies. Also the latest economic climate (the credit crunch) could mean low profits due to the lack of money people have to spend this means the museum might not be able to pay for labour or there electrical bills, possibly meaning it has to close down of the company. Political A political influence could be British Standards (BSI), BSI is the UKs National Standards body, and was the worlds first standards. BSI certifies products and provides product testing services. This could affect the museum by being recognised as selling and providing efficient products and services, if consumers recognise the museum as being to these standards, this will encourage them to go and visit the museum. Technological Technology could affect the museum through if it can keep up with the advancements in technology, e.g. promotional methods on the internet, booking on the internet and efficient cash registers- so they can maximise their profits and have awareness to consumers.  The task I have been set is important because if Preston Hall Museum does not make enough money to make significant profits, how will the museum be able to pay labour wages, electrical and gas bills, and be able to benefit from having the museum open. If they can increase visitor numbers, this would mean that these problems would not affect the museum. The tasks I have been set are to provide a brief introduction- what are the external influences that affect the hall, to carry out a SLEPT analysis, the target marketing of the Hall: to find out who is Preston Hall Museums target market and how to increase their target market. A further task I have been set is the current marketing mix- to give details on the museums product, place, price and promotion. Other tasks are market research- such as questionnaires, displaying my data clearly and to produce and give an overall marketing plan to try to increase the numbers at the museum. I am going to solve this problem by going through the questionnaires- to see how much consumers know about the museum (through advertising campaigns), how do they feel about the products on offer and are the prices right. Additionally, the consumers could give details on how to improve the museums 4ps. I will also try to solve this problem by putting the 4ps into a SWOT analysis, to see how well the museum is doing overall.

Sunday, July 21, 2019

Wireless Communication Systems

Wireless Communication Systems Introduction Wireless communication is part of todays world and is greatly in demand as such resources are preferred in todays world and so the sales are increasing day by day with equipment which involves wireless communication. The G which means generation, in the technology today amongst phones covers the technology improvement in the last few decades. The first mobile phone technology started with 1G which involved analogue technology. In the early 1990s the next generation of communication developed named 2G which was in a digital technology which also had text messaging with the idea of SIM cards coming into practice. SIM is short for (Subscriber Identity Module). Other technologies that evolved were CDMA(Code Division Multiple Access) and GSM (Global System for Mobile Communication). The next generation which followed made the data carrying better, making it potential to carry information such as websites as how they were originally. In 3G technology the iPhone has become the latest. As of today the agreement of 4G technology has not yet been established. It has been planned to have fast transfer speeds and should have good security. Something else that the 4G technology should meet is that it should reduce blips in transfer of the device when moving between different networks. The 4G mobile network should also be able to use the networks like the ones on the internet with IP addresses. 4G mobile is not yet implemented as an approved set of standards, so its characteristics are at present simply goals rather than requirements. As well as considerably desired increasing data transfer speeds, 4G mobile as well as should use improved security measures, When a device moves one place to another place between this area covered by different network reduce the blips in transmission is the another goal .4G mobile networks should also use a network based on the IP address system used for the internet. Two major systems using 4G technologies are WiMax and Long Term Evolution. WiMax began testing its 4G technology in Baltimore in 2008. The opposite system LTE was expected to be ready to be tested in 2010 and is expected to be ready for use in 2013. All this information above is described in detail in this research. All the topics covered above are broadened below. 3G 3G technology comes with better features than previous mobile network technologies. It has transmission which is at high speed, better multimedia access as well as connection globally.3G used with mobile phones a connects the phone with the internet and other IP connections which allow voice as well as video calls to be accessed. Not only this but also helps to download and surf the internet. From lower mobile technologies, 3G technology has higher data speed, better audio and video access, video calling support, Web use at quicker speeds and TV through the Internet. In 3G networks the transfer speed is between 128 and 144 kbps for devices that are fast and 384 kbps for slower ones. Wireless fixed LANs have a sped beyond 2Mbps. W-CDMA,TD-SCDMA, WLAN and cellular radio, among others are some of the technologies that 3G includes.[1] WCDMA The third-generation Universal Mobile Telecommunications System (UMTS) will be able to deliver high data rates of up to 384 kb/s at widearea applications or even 2 Mb/s indoors . This is achieved by using wide-bandwidth signals with Code-Division for Multiple Access (W-CDMA). The user data are multiplied by a fast pseudorandom spreading sequence before phase modulating the radio-frequency (RF) carrier. The resulting signals which are then broadcast have a bandwidth of approximately 4.5 MHz. Parameter W-CDMA Uplink 1920-1980 MHz Downlink 2110-2170 MHz Access DS-CDMA Duplex procedure FDD Modulation QPSK Pulse shaping Root-raised cos, Chip rate ÃŽ ± = 0:22 User data rate 384 kb/s; 2 Mb/s Bandwidth/channel 5MHz Max. output power 21 dBm (Class IV) TD-SCDMA It was proposed by the China Wireless Telecommunication Standards group to the ITU in 1999.60MHz has been reserved for CDMA2000 and UMTS, but TD-SCDMA has reserved 155MHz.In common with UMTS-TDD,TD-SCDMA does not require separate uplink and downlink and offer speeds from as low as 1.2kbps up to 2 Mbps. Uplink and downlink traffic can be transferred in the same frame but in different time slots, and there can be up to 16 codes allocated per slot, more time slot can be devoted to downlink transfer than in the uplink. This allocation of time slots is dynamic and if a symmetric allocation is required, which is usually the case for a telephone call, then this will also be allocated the required resources. The minimum frequency band required for this system is 1.6 MHz and the chip rate is 1.28Mcps.it does not have soft handover mechanism but has a system similar to GSM where the mobile device are tightly synchronized to the network, and it is from here that the term ‘syschronous is d erived. it is designed to work with a GSM core network is similar way to WCDMA and can also use the UTRAN signalling stack when it is deployed as a complementary technology. The frame is 5 ms rather than 10ms in WCDMA and split into seven slot.[2]. 4G The future system technology of 4G should bring something that is very enchancing when compared to the previous technologies. 4G yet does not have a meaning as it has not yet been established. However the current targets for it are as follows: system interoperability:-flexible interoperability of the various kind of existing wireless network, such as satellite, cellular wireless, WLAN, PAN and system for wireless access to the fixed network. It ability to roam between multiple wireless and mobile standards. Due to the interoperability of different mobile and wireless network through the same terminal we can identify the three possible configuration. There are Multimode terminals:-this is obviously achieved by incorporating multiple interfaces to the terminal, one for the access methods of every different kind of wireless network. The ability to use many access methods will enable users to use a single device to access the 4G network irrespective of the particular access method used. Overlay network:- In this architecture user will access the 4G network through the Access Points of an overall network. The AP will perform protocol translation and Qos negotiation for the connections. Since APs can monitor the resource used by a user, this architecture supports single billing and subscription. Common access protocol:-this choice calls for use one or two standard access protocol by the wireless networks. A possible option is for the wireless networks to use either ATM cells with additional headers or WATM cells. Terminal bandwidth and battery life:- Future generation network will be covering a large range of banwidths from about a couple of kbps to about 100 Mbps or above. The battery life is expected to be about a week. This will happen with a reduction of the size of the battery. Packet-switched fixed network.:- This 4G technology will use wireless IP based fixed networks which will be able to connect the mobiles with the wireless networks effectively. Varying quality of bandwidth for wireless access:- Having a range of networks together will cause it to overlap with other networks. Due to where they are, the user will be abl to use different qualities of wireless by the change of bandwidth. Distribution layer: This layer of the network will be able to help with digital video as well as broadcasting and due to a good coverage will cover all areas. Cellular layer: This layer of the wireless network will give a load of capacity providing many users as well as provide good coverage in highly populated areas. It will allow data sizes of over 2 Mbps. The cell size will also be small compared to the distribution layer, and will support good mobility. Hot-spot layer: This layer will help with good service over a short distance. It will include WLAN systems like IEEE 802.11 and HIPERLAN. This layer will not provide great coverage in particular as it is a short distance however roaming should be available. Personal network layer: This layer will include wireless connection however in short ranges say through the use of Bluetooth. Mobility will be less but roaming should be available. Fixed layers: This layer uses an access system which is fixed. Advanced base stations: In the future for networks, the new smart antennas will make the capacity bigger as well as base stations having self-configuration not needing the need for employment. This would reduce costs. They will include a good range of terminals. High data rates: The 3G system will be changed using what it has already to form the new 4G generation. The 4G generation will offer higher speed than the 3G generation. The introduction of 4G needs specific targets which are named above. To get to these targets, 4G needs the basis on how to achieve this which is explained in detail below.[1]. How 4G works: In the networks which have the 4G wireless technology, each one will be given an IP address which will have a home IP address and an address which represents its real location. When the computer in the Internet wants to communicate with another device perhaps a mobile phone in the wireless network. The computer will be able to send packets to the IP address of the 4G technology getting to know the home address too. To the phones address, the directory will send the packet through a tunnel, or a mobile IP, whilst on the meantime the directory server would also let the computer know that the phones address is correct. After this the other packets can be sent. The use of4G-IP address (IPv6) is that it will be able to carry more info than in the past with the IP address (IPv4). In this IP address, software can use them to tell the differences between services and to communicate with network areas of different sorts. This could be with the computer and the phones network. An example includes Moreover which uses 4G technology not only has this transmission way but also uses OFDM, MC-CDMA, LAS-CDMA, UWB *7 and Network-LMDS.[4] Orthogonal Frequency Division Multiplexing abbreviated as OFDM, passes on figures on a great quantity through a radio wave. Changing the radio signal into many small signals then transferred at the same time through different frequencies to the receiver is the method in which this is carried out. OFDM is a digital technology through modulation which increase strength of these signal; this is good for high digital data transition. This is a great digital technology method in which through the process of modulation increases the strength of the signal and is good for a transition of high quality digital data.[2] In this time, users might have a good question about how theses waves targeted the correct destination. A OFDM makes the radio wave target the right place though a couple of devices which are wireless, which make a connection tunnel when they start communication. After connecting the target, the radio wave splits into smaller signals which have the correct direction towards the target. MS-CDMA stands for Multi-Carrier Code Division Multiple Access, which is actually OFDM with a CDMA overlay. The users are multiplexed with orthogonal codes to differentiate users in MS-CDMA and single-carrier CDMA systems. It allows flexible system design between cellular system and signal cell system. However, in MC-CDMA, each user can be allocated several codes, where the data is spread in time or frequency. LAS-CDMA the shortened form for Large Area Synchronized Code Division Multiple Access, is made through by LinkAir Communication which is basically wireless technology through the developed 4G technology. LAS-CDMA makes voice capacity better, with high speed and the latest original solution called Code-Division Duplex (CDD) which combines the LAS-CDMA technology with the greater data transmission type of Time-Division Duplex (TDD). This combination makes Code-Division Duplex to be very spectrally efficient as well as having high speed available today as a great system. LAS-CDMA is seen as being the great 4G technologys ‘World Cell. If two wireless devices for instance are a quite big distance apart then using this protocol which has IPv6 to create the connection. In the 4G world, UWB radio which solves the multi-path weakening matters through its clever use of electrical impulses which has all frequencies at one time. Due to its low-power condition though, this UWB cannot be used outside of being indoors or underground. UWB should be used however with OFDM which cal transfer digital data on a large scale. This is positive though as the UWB would be running insides equally as the OFDM runs outside which means that the signal can stay strong. UWB also needs to be used in small distances inside the buildings through 4G technology. The broadband technology which is wireless used to carry video, data Internet as well as voice in 25 GHz is the Network-LMDS Local Multipoint distribution system. This method makes sure all these things are carried together at once, and this can be the result in the fading issue locally. [4] Differences between 3G and 4G: The main factors in which 3G and 4G technologies vary is due to their services, their ways of transmission, access to the web, the rates of transfer, security as well as quality. 3G technology can only carry upto the speed of about and up to 2 Mbps however 4G technology can go much higher to a better speed. 4G technologies can provide global connection whereas for 3G markets it is difficult to roam globally. Technology which uses 4G can provide global roaming at a lower price. 3g is based on the notion through circuits and packets through things like WCDMA, CDMA and TD-SDMA. However 4G uses the use of packets. As mentioned above about the differentiation between the 3G and 4G, this has been broadened in the tab le below. Feature 3G wireless technology 4G Wireless technology Speed Up to 2Mbps Full-mobility: up to 100Mbps Low-mobility:up to 1Gbps Service 1. Difficult of global roaming 2. Expensive 3. good for voice transmission 1. roaming smoothly 2. inexpensive 3. good for any type of transmission Core Network 1. Wide-area concept 2. Circuit and packet switching 1. broadband IP-based 2. Entirely packet switching Technologies 1. WCDMA 2. CDMA 3. TD-SDMA All access convergence Main: 1. OFDM 2. MC-CDMA 3. LAS-CDMA 4. UWB 5. Network-LMPS Wimax Wimax which stands for Worldwide Interoperability for Microwave Access was made to give a ordinary structure for wireless connectivity in permanent, moveable, and mobile environments. WiMAX is a wireless technology intended to give high throughput over a distance. It gives the quick broadband of link. It also provides wireless access which reduces costs which involves the fibre and making buildings. It has a range that goes beyond WiFi. A WiMAX uses two hardware components — a WiMAX tower as well as WiMAX receiver. This tower covers a 30 mile radius. The tower joins to the Internet using a wide connection through a wireline, or it offers a wireless link to other WiMAX towers with Line Of Site (LOS for short) microwave links. The receiver could be anything. NLOS (non-line of sight in full) connections join devices to the tower using a frequency range of 2-11 GHz as low wavelength signals are strong. LOS connections however do not cover as large area but covers and area of 4-6 miles. QoS is the aspect in a technology to deliver high bandwidth services. Examples of such include VoIP and IP video services as well as other services as such. To provide such QoS service, the WiMax need to make sure they have a low latency.[4] WiMAX security is defined in the Privacy Sub-layer in the MAC Layer, as specified by WiMAX standards. Fixed WiMAX (802.16-2004) typically uses X.509 certificates for authentication and 56-bit Digital Encryption System (DES), while Mobile WiMAX (802.16e-2005) uses EAP for authentication and Advanced Encryption System (AES) for encryption. Both employ Privacy Key Management (PKM) for authentication between base station and subscriber station.[5][9]. LTE Long Term Evolution (LTE) is a 4G wireless broadband technology made by the Third Generation Partnership Project. LTE has many benefits for not only the consumer but also the workers too: Performance and capacity one request that the LTE is to provide downlink rates of a minimum of 100Mbit/s and needs the technology to allow for speeds that are over 200Mbit/s. Simplicity From below 5MHz up to 20MHz, LTE supports carrier bandwidths. LTE also supports both FDD (Frequency Division Duplex) and TDD (Time Division Duplex). Ten paired and four unpaired spectrum bands have so far been identified by 3GPP for LTE. it is easiest to deploy 10MHz or 20MHz carriers, and eventually deploy LTE in all bands. plug-and-play, self-configuration and self-optimization will simplify and reduce the cost of network roll-out and management. LTE will be deployed in parallel with simplified, IP-based core and transport networks that are easier to build, maintain and introduce services on. Wide range of terminals- LTE supports hand-over and roaming to existing mobile networks, all devices can have ubiquitous mobile broadband coverage from day one[6].[9] COMPARSION BETWEEN WIMAX AND LTE Aspect Wimax LTE Access technology Downlink(DL) Uplink(UL) OFDMA OFDMA OFDMA SC-FDMA Frequency band 2.3-2.4GHz,2.496-2.69GHz ~2GHz Bit-rate: DL UL 75Mbps(MIMO 2TX 2RX) 25Mbps 100Mbps(MIMO 2TX 2RX) 50Mbps Channnel bandwidth 5,8.75,10MHz 1.25-20MHz Cell radius 2-7km 5km Cell capacity 100-200 users >200 users in 5MHz >400 users for large BW Spectral efficiency 3.75[bits/sec/Hz] 5[bits/sec/hz] Mobility: Speed Handovers Up to 120km/h Optimized hard handovers supported Up to 250km/h Inter-cell soft handovers supported Legacy IEEE802.16a through 16d GSM/GPRS/EGPRS/UMTS/HSPA MIMO DL UL No. of code words 2Tx X 2Rx 1Tx X NRx(Collaborative SM) 1 2Tx X 2RX 2Tx X 2Rx 2 Standardization coverage IEEE 802.16e-2005 PHY and MAC CN standardization in Wimax RAN(PHY+MAC)+CN Roaming framework Wimax forum Auto through existing GSM/UMTS [7].Verizon has devoted to using Long Term Evolution starting by soon, ensuring to deliver ten times the data throughput of 3G technologies in the current time. Others, including NTT DoCoMo in Japan, France Telecom, Vodafone in the UK, ATT, and T-Mobile have said also they will use LTE rather than WiMAX. Meanwhile, Sprint, Clearwire, and Comcast in the U.S., UQ Communications in Japan, and Yota in Russia are all competitively using 4G networks suitable for mobile networks using todays edition of WiMAX, 802.16e (2 to 10 Mbps), in inner-city markets where they will without doubt compete with 3G (and later, LTE) sources. The WiMAX Forum declares that 504 operators in 145 countries have organized WiMAX, but many use older 802.16d technology that however cannot provide mobile services, and many are small operators in developing countries or pastoral areas.[8] Conclusion:- In every generation, when there is a default, the next following generation gets rid of this and a new idea or notion is found as a result. However at some points this may be difficult to happen due to several reasons. The world is looking forward for the most intellectual technology that would bond the full earth. New ideas are being introduced by researchers throughout the world, but new ideas introduce new challenges. There are several issues yet to be solved like integrating the mobile world to the IP based core network, resourceful billing system, and smooth hand off mechanisms. Reference: Future mobile networks 3G and beyond Edited by Alan Clapton published by : the Institution of Electrical Engineers, London, United kingdom Convergence Technologies for 3G Networks IP,UMTS,EGPRS and ATM Jeffrey banister, Paul Mather and Sebastian Coope at Orbitage Consultants. http://docs.google.com/viewer?a=vq=cache:suYVNKca06YJ:www.habits.in/hab_files_007_822/files/3G%2520TO%25204G%25205G.pdf+limitations+of+4Ghl=engl=ukpid=blsrcid=ADGEESgduPdmeqSL9dwRiGnFJ0JOIktrJxjYXI8_5x7PWdeg7eQwcmvkJGDQE-N6lFOL62qsTZW4So4iJ9oIZIeb3tSr6X8xD35e3gjxiI_g6tL4XcJMY3MYFWZyjtnclDWgFCAA8S6Rsig=AHIEtbSPBQflncP4szu1MI5tLZL4tX8Y9g Wimax taking wireless to the max Deepak Pareek published in 2006 by Auerbach publications http://4g-wirelessevolution.tmcnet.com/topics/4g-wirelessevolution/articles/what-is-wimax.htm 15/03/2010 19.00 http://4g-wirelessevolution.tmcnet.com/topics/4g-wirelessevolution/articles/lte-ericsson.htm 15/03/2010 20.00 http://www.comsysmobile.com/pdf/LTEvsWiMax.pdf 15/03/2010 19.00 http://www.wi-fiplanet.com/news/article.php/3845111 15/03/2010 19.00 http://www.cs.york.ac.uk/rts/docs/CODES-EMSOFT-CASES-2006/codes/p266.pdf 15/03/2010