Friday, November 29, 2019

Take Off That Mask Essays - English-language Films, Boxing Films

Take Off That Mask Take Off That Mask As sad as it seem first impressions often dictate the way people feel about one another. In most cases the way a person looks doesn't at all reflect on their personality. This stigma of the way a person looks goes far beyond being pretty and ugly. All to often people are assumed mentally retarded because of a facial deformity when in fact that person is as able or in many cases more then able to perform and task they are asked to perform. Ironically in this modern society where such stigmas exist, some movies are able change our thinking if not remove the stigmas altogether. The film Mask is a perfect example. This movie shows the stigmas for what they are and at the same time changes our impression of facial deformity. This movie enables anyone who views it look at a person and see them for who they are and not what they look like. The film Mask we see the story of Rocky Denis, played by Eric Stoltz, is a teenage boy dealing with the effects of craniodiaphyseal dysplasia. Craniodiaphyseal Dysplasia also known as Lionitis, is a life shortening disease that causes calcium to accumulate in the skull. The calcium make the head grow to twice the normal size. Rocky obviously does not look like the average teenager. This is an observation we can see right away. Outside of the way Rocky looks his lifestyle is also slightly different from most teens. His mother Rusty, played by Cher, is affiliated with a gang of bikers. She drinks and uses drugs, and although she seems to try and hide these things from Rocky he is well aware of what his mother is doing. The movie is quick to bring some of the stigmas about Rocky's disorder to our attention. In two scenes we see how people outside of Rocky's immediate family treat his disorder. First we see how the principal of the local public junior high school views Rocky. He tells Rocky and Rusty that, ?There are special schools for children like Rocky,? the principal upon looking at Rocky immediately thinks he is mentally retarded. Rusty shows him this is far from the truth by giving the principal his grades from lower levels of schooling. She then threatens to sue the school if he does not enroll Rocky. Rocky shows the principal a thing or two when he goes on to graduate with awards for excellence in almost every academic subject. The principal also shows Rocky a little surprise when he offers him a job at a summer camp for blind children. The second scene is particularly disturbing because it takes place in a hospital. In this scene a doctor that is not familiar with Rocky's case tries to explain to Rocky and Rusty the unfortunate truth of his life expectancy. Rocky and Rusty deal with the situation by pretty much brushing off everything the young doctor says. The reason this scene is disturbing is because the doctor inadvertently makes himself no better then a common person misjudging Rocky. The one place you would think Rocky can be free from these stigmas seems to be worse then the outside world when a doctor gives off the emotions of a person seeing Rocky for the first time. The film again captures the view of Rocky's face and the first impression people have when Rocky goes to his first day of school. At the junior high school the students see him and make their impression and Rocky carries on as he always has. The students seem to overlook the fact that a biker from the gang dropped Rocky off at the school. In most junior high schools a student that is dropped off by a biker would get the full attention of bystanders. In this case all they notice is Rocky's facial deformity. As time passes the students like the principal accept Rocky for who he is. The acceptance of ?who he is? is a very important theme that constantly comes up in the movie. At one point Rocky gets in an argument with his mother in which he asks her ?Don't you get it, it's girls

Monday, November 25, 2019

buy custom Typhoons essay

buy custom Typhoons essay This is a research report on Typhoons. The researcher attempted to find out the mechanism by which typhoon occur, effects of typhoons and effectiveness of human activities in response to typhoons. He used both primary and secondary sources to collect data. These included interviews, questionnaires, and documented materials. The finding revealed that three mechanisms are responsible for the formation and development of typhoons. These includes is monsoon troughs, Tropical Upper Tropospheric Trough (TUTT), and a font. Effects of typhoons include heavy rains, storms, strong winds, and tornadoes, which lead to deaths and destruction of the environment. The researcher also found out that typhoons are predictable. People receive warnings prior to typhoon occurrence. Introduction Typhoons develop in Northwestern area of Pacific Ocean. A typhoon can be defined as a tropical cyclone, which is mature that occurs between 180 degrees and 100 degrees East of the Pacific Ocean. Official seasons for Typhoons have not been identified as the clones form all year round. Six conditions must be fulfilled, for Typhoon to form and develop. The sea surface temperatures ought to be warm and sufficient. There must be instability of the atmospheric conditions. The troposphere must have high humidity at the middle and lower levels. Coriolis force is also a requirement for low-pressure centre to develop. There must be pre-existing disturbance of low level, and finally, there must be wind shear at lower vertical (Sharkov, 2000, p. 67). Most of the storms occur in June and November. They are at their minimum around May and December. The most affected countries by Typhoon include Philippines, China, and Japan. The deadliest typhoons usually occur in China, especially Southern China. The wettest typhoon occurred in Taiwan. The researcher, therefore, decided to carry out a research regarding Typhoons to determine how they occur, their impact, and the effectiveness of human resource response to such events. Methodology The researcher carried out his research between April and June 2011 to determine typhoon types, their effects, and effectiveness of human response. He used both secondary and primary methods of data collection. Under primary source of data, the researcher used interviews and questionnaires, which included questions of interest. He then administered them to Philippines who witnessed the recent Philippine Typhoon. These included six men and four women who answered the interview questions and who filled in the questionnaires. He ensured that he remained within the scope, to avoid irrelevant data. Secondary sources included documented data from Typhoon Research Department. Other sources included geography textbook, newspapers, Journals, and the internet. He compared the data from the various sources. These sources gave the researcher relevant data, which he later analyzed to help him make a research report (Dineen, 2006, p. 87). Results The researcher was able to collect data using the two main methods; primary and secondary data collection. Primary sources helped the researcher to obtain data regarding the occurrence of typhoons and its effects. Effects included heavy rains, strong winds, tornadoes and large storms. All these would lead to deaths of both human beings and animals. Plants are destroyed leading to famine afterwards. Secondary sources showed that typhoons occur through three main mechanisms. These included monsoon trough, Tropical Upper Tropospheric Trough, and fonts. Six preconditions must also be fulfilled, for a typhoon to form and develop. Typhoon research department was most helpful in giving this information. Textbooks, journal and other sources gave information regarding the effects of typhoons and human activities in response to typhoons. The researcher found out those typhoons can be predicted and that warnings come 18-24 hours before their occurrence. Citizens get advice on how to behave in case a typhoon occurs. The researcher was also able to identify the countries, commonly affected by typhoons. These included Philippines, Japan, and China. Discussion Formation mechanism The researcher found that certain preconditions must be fulfilled for Typhoon formation. First, the sea surface temperatures ought to be warm and sufficient. There must be instability of the atmospheric conditions. The troposphere must have high humidity at the middle and lower levels. Coriolis force is also a requirement for low-pressure centre to develop. There must be pre-existing disturbance of low level, and finally, there must be wind shear at lower vertical. If the above preconditions happen, typhoon occurs. The most common mechanism of atmospheric disturbance is monsoon trough. This refers to Inter Tropical Convergence Zone (ITCZ) extension after the formation of cyclonic. ITCZ refers to low pressure trough, which occurs when Southeast and Northeast trade winds converge (Jakob Hungr, 2005, p. 91). Tropical Upper Tropospheric Trough (TUTT) is yet another cause for the formation of Typhoon. The upper air is low according to nature, as compared to the surrounding environment. The low-pressure starts at the low level when it is warm compared to the surrounding environment. When the low Tropical Upper Tropospheric Trough remains for several days over the seawater, it warms up, and it gets the characteristics of tropical. Once this happens, it gets down to the water surface and typhoon forms and develops. The other cause of typhoon formation and development is a front. A font comes over the tropical waters. Storms and showers occur when favorable winds and wind shear occur, bringing a typhoon. Monsoon trough, however, cause most typhoons in the Pacific Ocean (Davis, 2008, p. 79). Effects of typhoons Typhoons bring destructive impacts such as heavy rains, large storms, tornadoes, and strong winds. Human beings also are killed, lost or injured when typhoon occurr. Flooding can drown people. It also sweeps away property and destroys houses. The strong winds and heavy rains destroy crops. At the same time, they cause soil erosion. Mudslides also occur which can be destructive. This leads to shortage of food, lack of medical care, limited access to infrastructure, among other effects. Typhoons also affect animals in that they get drowned. The environment destruction leaves animals with nothing to feed on, hence death. The smaller animals disappear, and the large animals die of hunger. When houses are destroyed, animals suffer since they will have nobody to take care of them. Animals become exposed to strong winds and heavy rains, which are destructive (Dineen, 2006, p. 64). Effectiveness of human activities in response to typhoons Typhoons are natural disasters. Human being, however, need to take precautions to avoid severe destruction. At least people are lucky because typhoons are predictable. The department of Typhoon research can predetermine occurrence of a Typhoon. This helps people prepare both physically and psychologically. People should keep the windows and doors closed throughout when there is a typhoon/ hurricane. Typhoon specialists say that the difference in pressure between the room and outside the room cannot make the house blow out. Scientists announce warnings between 18- 24 hours. People living around the sea should, therefore, evacuate their houses as a safety measure. People ought to ensure that the water mains remain off after an aftermath of a typhoon. This is so because the water pressure becomes interfered with and another disaster could occur in the houses. It is also advisable to shift from the ground floor in case one cannot shift entirely. Nowadays, houses are being built in such a way that they can stand the strong winds and rains. All these human measures to tackle to typhoon issue prove to be quite effective though not in all situations. It is, therefore, crucial that people follow these precautions to prevent devastating effects of typhoons/ hurricanes (Hsieh, 2000, p. 71). Conclusion Typhoon form and develop in the Northeastern part of the Pacific Ocean. The strong ones occur in June and November. Three mechanisms exist that lead to the formation of typhoon. The first one is monsoon troughs, Tropical Upper Tropospheric Trough (TUTT), and a font. However, these occur after the preconditions for the formation of typhoons. Typhoons cause strong winds, heavy rains, tornadoes, and heavy storms. These, in turn, affect human being, animals, as well as plants. Deaths occur since people and animals get swept away by the strong winds and rains. Plants die and soil erosion occurs, which further leads to future calamities due to lack of food and vegetation. Human beings perform a number of activities to prevent the devastating effects of typhoons. Warnings come prior to the occurrence of typhoons, and people get advice on how to behave; the areas to avoid, and the expectations thereafter. This prepares them physically and psychologically (Murnane, 2004, p. 56). Buy custom Typhoons essay

Friday, November 22, 2019

Characteristics of Anthroponyms

Viktoriya Melnychuk; Khmelnyts’kyi regional MAN department; Shepetivka educational complex #1; form 11; Tarnavska Olena Myhaylivna, the candidate of philological sciences, associate professor of department of English philology of the Volynskiy national university named after Lesia Ukrainka. The purpose  of this paper  is to analyze anthroponyms, their semantic, social pragmatic and functional characteristics of  anthroponyms (based on the novel  John Updike  Ã¢â‚¬Å"The Centaur†). The full communication, that is correct perception, evaluation and interpretation of information, is impossible without knowing the specific set of anthroponyms and their functions in language and text. The names of famous personalities, literature characters make up a significant part of knowledge, necessary for understanding and assessment of the culture different people. Therefore, our research is relevant. The subject of the research is semantic, social pragmatic and functional characteristics of  anthroponyms (based on the novel  John Updike  Ã¢â‚¬Å"The Centaur†). Anthroponomastics  , a branch of  onomastics, is the study of  anthroponyms  , the names of  human beings. Anthroponyms often preserve lexical elements that have dropped out of the standard  lexicon  of a  language. The subdivisions of anthroponymy include: given names, surnames, clan names, matronyms, patronyms, teknonyms, nicknames, ethnonyms. Allusion is the main feature of the anthroponyms. Allusion is a brief reference to some to some literary or historical event commonly known. Allusion is a subtype of metaphor. Metaphor denotes expressing remaining on the basis of similarity of two objects: the real object of speech and the one whose name is actually used. But there is only affinity, no real connection between the two. Most of anthroponyms in the novel John Updike â€Å"The Centaur† are the individual, which expressed their own names, surnames, status names and perform the nominative function.

Wednesday, November 20, 2019

The Hunger Games Essay Example | Topics and Well Written Essays - 1000 words

The Hunger Games - Essay Example The young characters have been depicted as heroes and heroines when some of them are seen reflecting on happier moments in the past, a good example being the main character, Katniss. This essay will critically analyze the book, giving a breakdown of the main ideas found in each of the chapters. In the first chapter, the author introduces Katniss Everdeen, the narrator and the main character. The teenage girl sets out on a gathering and hunting expedition with her friend Gale as they await for the reaping in the afternoon. Katniss has been forced to take part in a fighting tournament against other teenagers. The government has forced children to fight each other to death on TV, the winner taking home prizes. The fights are usually broadcasted to the entire world. Katniss does not enjoy the fights, but she kills with a lot of professionalism and finesse, just to stay alive. From the story in the book, it can be analytically noted that the author has used Katniss to show a transformatio n from a difficult life to one where she experiences pleasure. Katniss lived a life that was full of poverty and suffering. Due to her efforts in hunting and gathering, she used her skills to later enjoy her life by experiencing pleasures which she never knew of before. These pleasures include pretty clothes, food and warmth. However, it is important to note that the author has not in any way depicted sexual pleasure. This shows that the book is very chaste and non-erotic, making it very appropriate for its target audience, young adults (Grossman 1). The story also focuses on the life of a teenage girl who gets stung to death by a mutant swarm of hornets. The author has used violence in a very hypnotic way, unlike other books on violence which tend to be very repellent. This is because violence has been used amidst a fairy tale, making the book very unique. The violence is not merely a cheap thrill. It is something deeper in the sense that the author condemns violence and the action s that take place in the arena but invites readers to enjoy the violence that has been narrated in the story (Sperling 1). ‘The Hunger Games’ exposes children readers to the violence against which society tries so hard to shield them. The author uses this strategy to show adults that they should not forget their experiences as children. They wanted to enjoy the same things against which they are shielding the children. The author supports the fact that children are not stupid, and they are physical creatures. This makes them aware of the fact that violence raw emotions, power and violence exist. The author is really saddened by the fact that adults choose to pretend that these things are not in existence and that children should not know about them (Grossman 1). The book is a bloody, horrifying and chilling one because of the violence depicted through the actions of the characters. The author shows a lot of bloodshed and ruthless killing, especially among children. The setting of ‘The Hunger Games’ is an unspecified time in the future, where such violence seems to be the order of the day (Grossman 1). This shows just how bad the author thinks things will be for humanity in the future. The world that the author has depicted is one whereby a ruling caste dominates the people. In the story, this ruling caste lives in a city known as Capitol (Sperling 1). The rest of the vulnerable population that is being dominated by

Monday, November 18, 2019

(Critical Analysis) Essay Example | Topics and Well Written Essays - 750 words

(Critical Analysis) - Essay Example She goes to the extent of looting to ensure that her sick brother gets daily medicine for his survival. The film shows some religious institutions, such as church, and they way they help suffering neighbors and members. Good neighbors, like Madea and Pastor Brian, take the responsibility of taking care of these young children by giving them food and ensuring they find their relatives in town. One of the relatives is the woman named April, who is the children’s aunty. She is a nightclub singer and an alcohol addict living with a married man who has ran away from the responsibility of taking care of his family. At the end of the film, she transforms from her past lifestyle into a loving and caring aunty and later gets married to Sandino; an immigrant who she accommodated in her basement. According to IMBd website, the film, cast actors and actress have been nominated and won several awards. Some of the awards include Bet Awards, Black Reel Awards and Image Awards in 2010. For ex ample, in 2010, Adams Rodriguez (Sandino in the film) won the Image Awards under â€Å"the Outstanding Character in a Motion Picture.† The film can be classified into three theories of communication namely inclusion, need for control and need for affection. The theory of inclusion applies in this film where Sandino a middle aged immigrant in search of work and a place to settle in a foreign country approaches church leaders for help. The church leader requests April to accommodate him, she allows her to stay in the basement. Sandino fits well in this theory as he seeks to be liked and loved by Jennifer and her little brothers. He goes to the extent of buying them the syringes and medicine for Jennifer’s younger brother. Jennifer wonders why he is concerned and good to them; according to her the world is unfair and presents a tough face to all the people in it. Sandino fights to be loved by all; April included, as he repairs one of the rooms and ensures that everything is in place for the comfort of the young ones. At the end, he comes out to defend Jennifer as he was about of be raped by April’s boy friend. Sandino makes April to transform her past behavior of mistreating her niece and nephews and addiction to alcohol. Sandino ends up to be loved by all in April’s family and church members, who end up organizing a nice wedding between him and April. The theory of need for control is also found in this film. One of the funny characters in this film is Madea, who is firm, in control and wants to be recognized as one in charge of the activities going on in her house and that of anyone she comes in contact with. The film introduces Madea from on set. She wakes up after Jennifer and her brothers try to loot her house. She firmly disrupts her husband’s sleep, she show her power of control when she invites Jennifer and her brothers to have a meal with them. She wants them to refer to her as ‘madam’ whenever they answer her questions. She shows the control in her by driving the children to April’s house. She orders one of them to knock the door as loud as he can until April wakes up. Madea commands April to take her niece and nephews, which she accepts without further argument. Although Madea may be seen as controlling freak, Jennifer goes to her to figure out how to pray. Though she did not understand the Biblical stories, she agreed to teach Jennifer. She extended her generosity by advising her how she could manage all her

Saturday, November 16, 2019

Analysis and Review of Andrew Niccols Film Gattaca Essay Example for Free

Analysis and Review of Andrew Niccols Film Gattaca Essay Man has already landed on the moon, and Sputnik has enabled research on other solar planets. Lives have become healthier, longer, with modern hygiene, sanitation, medicine, and surgery, conquering more physical and mental illnesses by the month. Science has also presented a means of cloning and genetically modifying organisms and food, and shows little to slow it’s pace of evolution. I belonged to a new underclass, no longer determined by social status or the color of your skin. No, we now have discrimination down to a science. Vincent Gattaca, directed by Andrew Niccol, gives a perspective of what the future of discrimination is to evolve into: no longer determined by skin color, gender, or social status, but scientific DNA. The civilization portrayed is a discriminatory one, in which status and quality of lifestyle is determined solely by a DNA profile. Children are created by DNA manipulation to produce an impeccable genetic composition, with parents able to buy whatever traits are deemed fanciable for their child. The movie hypothesizes this as a potential practice in the not too distant future, as one where technology’s influence in everyday life is at peak. True or False? It is impossible for our society to become like the one in the movie, ‘Gattaca’, because we don’t have the technology or the capacity to discriminate that way. This essay will argue false, that it is possible that our society is able to become that of Gattaca (sterile, genetically enhanced, and derogatory) although it’s morality is questionable in regards to pros and cons, due to various reasons such as the development of genetic engineering and IVF babies, as well as examples of genetic discrimination in the past presented. * * Recently scientists have made rapid advances in our knowledge of the human genome, as well as our abilities to modify genes. Nowadays, society is able to determine the gender of their child, just like that of Gattaca. An example of an advanced reproductive technique endorsed by society is the InVitro Fertilization (IVF), in which eggs are fertilized with sperm in test tubes to allow parents to reduce the chance of gen etic disorder in the child – with the world’s first IVF child Louise Brown turning 30 this Friday 25th. Parents are now able to choose the type of sperm that will fertilize an egg, which determines the gender and genes of the baby, and allow Pre-Implantation Genetic Diagnosis (PGD) to screen embryos for potential disease. â€Å"We might see a move towards artificial chromosomes and genetic cassettes that can be inserted at the embryonic stage to correct particular diseases, including Huntington’s†, wrote Prof. Trounsen in the scientific journal nature. One day we may be able to choose cosmetic or desirable characteristics and cure genetic diseases, just like we can modify embryos and undergo surgery to change eye color successfully today. * * Make the child perfect in the test tube, and save money in the future, is a testimonial presented in Gattaca. The current technology of society is quite competent, especially in regards to future development. In essence, genetic engineering may be defined as the manipulation or alteration of the genetic structure of a cell or organis m in medical, industrial, and agricultural fields. It has enabled the successful cloning of Dolly (1996 – 2003) the sheep by Ian Wilmut using a cell from a mammary gland, which is a revolutionary example of the windows opened due to genetic engineering; a hint at what the future could bring. In fact, the successful cloning of many animals (including CC the kitten, Idaho the colt, and Snuppy the dog) will most certainly one day evolve into human gene manipulation at birth; due to this the foundation of Gattaca as humans artificially perfected is theoretically possible. * * * The main character, Vincent (Ethan Hawke) is discriminated against due to his ‘in-valid’ genetic makeup; he doesn’t have a chance in the society of Gattaca because potential employees were not tested for skills or knowledge, rather, their physical and mental possibilities. This form of discrimination refers to treatment or consideration based on genetic status or category, rather than individual merit, and occurs when employers/insurance companies treat people differently because they have a gene ‘mutation’. Many examples in the past depicting this theory include a 1995 survey of people with a known genetic condition in family history found that 22% quoted being denied health insurance due to genetic status, regardless of whether they were already sick. Another case of genetic discrimination is Terri Seargent’s, who, having Alpha-1 antitrypsin deficiency, was abruptly fired after her employer received a bill for preventive treatment, despite having consistently referred to her job performance as exemplary. Furthermore, if society didn’t have the capability to discriminate genetically, the Genetic Information Nondiscrimination Act (2008) would need not be introduced. To the question of lacking the capacity to discriminate this way, it is justifiable to conclude that society is capable of such derogatory action. * * In conclusion, the genetically modified world presented in Gattaca is possible due to competent and developing technology in the fields of genetic engineering. Scientific advances like the IVF baby and successful cloning techniques have huge implications for future human reproductive technology: genetic diseases such as Huntington’s could be corrected using artificial chromosomes, and the production of replacement organs from a person’s cells made a reality. In addition, we are also capable of genetic discrimination, as is consistent with Gattacan society.

Thursday, November 14, 2019

The Epidemic of Steroid Abuse in America Essay -- Athletic Athletes Sp

The Epidemic of Steroid Abuse in America We as a people are preoccupied with the notion of greatness. Our role models are athletes, actors and actresses, and other figures in the public eye. Many of us often desire to be better off than our current state; to look better, to be in better shape, etc†¦ We compete with each other for jobs, for mates, for grades, for parking spots, and in sporting activities. This competitive nature is a way of life, especially in sporting activities, often learned as a child and built upon throughout adulthood. But where do you draw the line? At what point do the â€Å"costs† of winning or being â€Å"better† outweigh the benefits? Maybe it’s too much when you start putting your own health in serious jeopardy just to look better or run faster. The use of steroids, other than for medical purposes, has extremely negative effects on one’s health. Nonetheless the use of steroids, to enhance athletic performance and increase muscle mass, is on the rise. There needs to be mandatory steroid testing in all professional, and where applicable, amateur sports. Steroid testing is a good as start as any to help curb steroid abuse. Anabolic-Androgenic steroids, often solely called anabolic steroids, are: â€Å"chemicals that act like hormones--substances normally in your body that regulate bodily functions† (Kowalski 1). They are synthetic substances, meaning man-made, which have two functions: the anabolic effect which causes an increase in the growth of muscle mass and the androgenic effect which causes, or increases, the development of male sexual characteristics. It’s the anobolic effect that most steroid users, or abusers, are after. Steroid abusers take steroids for a couple of different reasons.... ...pac.library.csupomona.edu/>. Sherman, William. â€Å"Growing Nightmare of Steroid Abuse: Athletes’ Cocktail Big in Nation’sGyms.† Daily News (New York). 28 July 2002, Sports Final ed.: p. 4. Lexis Nexis 4 Nov. 2002. . United States. Consumer Affairs, Tourism and Foreign Commerce Subcommittee of the Senate Commerce, Science and Transportation Committee. Hearing. Washington D.C.: Senate Office Building, 2002. Lexis Nexis 4 Nov. 2002. . Verducci, Tom. â€Å"Totally Juiced.† Sports Illustrated. 3 June 2002, V. 26: No. 93. Wilson Web Article Index 4 Nov. 2002. . Yesalis, Charles E., and Virginia S. Cowart. The Steroids Game. Illinois: Human Kinetics, 1998.

Monday, November 11, 2019

Drm Exma Ii

Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. B)reduced training costs. C)cross-system communication.D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Ana lytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationshipAnswer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be rev ersed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index.D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 VarcharsB)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called â€Å"Type† D)Alters the Customer_T table by adding a 2-byte field called â€Å"Varchar† Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ‘HI’; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the aboveAnswer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database ContentsAACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data.D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = â€Å"Best†A)Selects all the fields from the Customer table for each row with a customer labeled â€Å"best† B)Selects the â€Å"*† field from the Customer table for each row with a customer labeled â€Å"best† C)Selects fields with a â€Å"*† in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled â€Å"*† Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v;A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name â€Å"Product_Description†?D)How many different columns named â€Å"product Description† are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: U sing Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ‘WOOD’; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v);D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single TablesSubtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) & Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity > 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 itemsD)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2.D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Proces sing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight > 100 and weight < 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select cust omer_name, telephone from customers where city in (‘Boston’,’New York’,’Denver’); A)The customer_name and telephone of all customersB)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single TablesSubtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A )agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries gr oup by driver_no; A)A listing of all drivers, sorted by driver numberB)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ‘MA’ group by driver_no; A)A listing of all drivers who made deliveries to state = ‘MA’, sorted by driver number.B)A listing of each driver who made deliveries to state = ‘MA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ‘MA’ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 3 40, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: BLevel: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view.D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join.J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most common ly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: CLevel: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join.Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) sup erquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: CLevel: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: BLevel: ModeratePage Ref: 369 Topic: Processing Multiple Tabl es Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if stat ement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional ExpressionsAACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above.Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for a ppropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: DLevel: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ‘CUSTOMER’; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-de fined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) OLAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving FunctionsAnswer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePa ge Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stored Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27.A named set of SQL statements that are considered when a data modification occurs a re called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level : ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of another language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQLAACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible ap plication. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above.Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technolog y 2.Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN trafficB)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement i s generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Level: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server.A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Cl ient/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9.Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Archite ctures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server.B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process.D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18.Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoft’s Transaction Server and IBM’s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synch ronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system.A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to cli ent/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the application’s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction process ing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27.Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)objec t linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server nameC)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not.B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2.The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. Wh en we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above.Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data WarehousingSubtopic: A Brief History AACSB Use of Infor mation Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systemsB)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463–464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8.Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data WarehousingSubtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts.This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart.B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data.C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)represen tation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically s eparate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a transaction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event DataAACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A) Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: BLevel: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema.B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data LayerSubtopic: The Star Schema AA CSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice.D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing.D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets?A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following dat a mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization?A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills

Saturday, November 9, 2019

Develop a Coherent Marketing Mix for a New Product or Service Essay

In this assignment, I am going to describe and explain how Apple uses the marketing mix for one of its latest product, a mini IPad. Marketing mix Marketing mix is commonly known as the 4Ps: product, price, place and promotion. These are controllable element and it importantly use when determined and adjusted until the right combination that serve the needs of the product’s consumers. Description of the product The product I have been chosen is one of the latest product of Apple which have been released during November 2012, the mini IPad. This new IPad is available in two models, one with Wi-Fi and another is Wi-Fi + cellular. The IPad mini has two colours which is black and white and the price range is from  £269 to  £529 Target market The target market that chosen for the mini IPad is male and female between the ages of 19 to 49, those that are currently in further education or in employment. Also, it is also targeting at Apple loyal customers. The reason for this market group is because, people between the ages of 19 to 49 are more likely to use high technology product. Especially with people who are in education and employment because they will need to use tablet for works purposes. Product life cycle When developing a product, Apple must consider factors such as, customers’ wants and needs, the physical appearance of the product, the quality and reliability of the product.  All products must go through a product life cycle which is an important concept in marketing. The product life cycle describes the stage that many products must go through. However, many products will not be able to reach to the final stages because of decrease in demand of product failure. The four stages of the product life cycle are; * Introduction – researching, developing and then launching the product * Growth – when sales are increasing at their fastest rate * Maturity – sales are near their highest, but the rate of growth is slowing down, e.g. new competitors in market or saturation * Decline – final stage of the cycle, when sales  begin to fall Reason for chosen product The reason that I have chosen the mini IPad is because; the mini IPad is one of the latest technologies available in the market at the moment. Moreover, it is also because, all the applications are available and easily to download from the Apple store that have been built in with the mini IPad. Plus, the mini IPad is light in weight and with the Wi-Fi and cellular connection available it is very easy to carry along. Therefore, this mini IPad has been designed to meet many of customers’ requirements of an ideal table which are; efficient, portable and easy to use. Another reason that made me to select out this product is because of its attractive appearance. Apple has designed this product to meet both genders as the mini IPad is available in two colours; black and white. Normally, the attractive classic black is an option for male while the stylist shinny white is for female. The appearance and packaging of the product is important because the consumers must look at the appearance first before knowing the quality of product. So, if the mini IPad is badly presented its may not be able to catch customers’ eyes. Moreover, one of another important reason for chosen the mini IPad is because, Apple is popular for developing quality and high performance product that can last for long time therefore, it is very likely that the mini IPad are also to have a high quality performance. Pricing Out of the 4Ps, price is the only element which creates sales revenue for Apple while all the others Ps are costs. . The price of an item is clearly an important determinant of the value of sales made. Researching consumers’ opinions about pricing is important as it indicates how they value what they are looking for as well as what they want to pay Pricing strategies is not an easy for business including Apple, to determine because the price must be reasonable and appeal to the target market. Within pricing strategies, there are three factors to its; cost based pricing, customer based pricing and competitor based pricing. Cost based pricing is when price is determined by adding a profit element on top of the cost of making the product. Customer based pricing is where prices are determined by what Apple believe customers will be prepared to pay. While competitor based pricing is where competitor prices are the main influence on the price set. Currently, the price range of the mini IPad is from  £269 to  £529. This price range is determined based on the combination of cost and customer based pricing. It is based on the cost based pricing because, people who are actually buying the mini IPad are not interested in the production cost of the product but instead, what they are interested in is the value which the mini IPad provides them. Moreover, it is also considered as customer based pricing because, the price range of the mini IPad is considered as a premium price for a tablet. However, demand for the mini IPad is still high because mini IPad are seen as quality product and people are obsessing about it so they are willing to pay at the high price, therefore the price for this product is seen as reasonable for the target market. Promotion Promotion is all about communication, the process where businesses tried to raise awareness of products to the customers. Therefore, the main aim of promotion is to ensure that customers are aware of the existence of the products and also, persuade and encourage customers to buy the products. Normally, business would use AIDA model for its promotion. AIDA stands for; * Attention : A process when Apple need to attract and grab the customers’ attention by having a standing out point. * Interest: A process where Apple need to create interest in the mini IPad by demonstrate its advantages * Desire: A process where Apple need to move from discussing benefits to specifically how those benefits will help that customer. * Action – A process of getting the customer to buy the mini IPad. Promotional mix Furthermore, there are many types of promotional mix which is promotional methods for Apple to choose from. Example of promotional mix are includes; advertising, personal selling, public relations, direct marketing and  special promotion. Not all businesses are using the same types of promotional mix so in term of Apple, because the mini IPad is a premium product, Apple is less likely to do a special promotion such as buy one get one free. But instead, promotional mix, that Apple would be using are like advertising. Because Apple is a large global business with high profits figures therefore, they are more likely to use expensive type of advertisement. For instance, a television adverts during a prime time slot, electronic billboard and whole page print advertisement on Guardian newspaper. Similarly, Apple are also likely to use direct marketing which is a channel agnostic form of advertising that allows Apple to communicate straight to customers via text message, website and email. As evidences, if people are to visit Apple webpage and sign up for newspaper, they will definitely find information about all new products of Apple including the mini IPad. Place Place in marketing is also known as distribution channel, a location or methods where customers can buy what the businesses is offered. So, the main objective of place in marketing mix is to make products available in the right place, at the right time. So for example, if there are no Apple stores in London, many consumers would not bother to go all the trouble to buy the mini IPad. Distribution channel can be direct transaction between Apple to consumers but, it is can also be from Apple to retailers like Tesco then to consumers. Moreover, there are many distribution methods that business can choose from and each one of the business choose a different way to approach it to their customers. For example, market stalls, online, and stores. When Apple are to consider to select their distribution channel, they are certain factors that they must aware of. The first factor is market segment, so a place that must be familiar with the target market. Second factor is changes during the product life cycle as different channels can exploited at the different point. The third factor is the amount of training and support the distributor requires. In term of Apple, because they are a global business so, they are currently having many channels to distribute its mini IPad. The most common channel is through the Apple store that available to visit across many cities. However,  because demand for Apple’s product is too high, many consumers now prefer to pre-order and buy the product online which is much quicker and efficient. Conclusion In conclusion, all of the 4Ps elements of the marketing are to have a major impact on the mini IPad, therefore it is recommend that Apple must always careful with it.

Thursday, November 7, 2019

Lifespan Development and Personality Essays

Lifespan Development and Personality Essays Lifespan Development and Personality Essay Lifespan Development and Personality Essay Lifespan Development and Personality By Denise Isaac Carroll Lytch Psych 103 April 28, 2010 Developmental psychology seeks to address various aspects of human development, including physical, cognitive, social, moral, and personality development. In developmental psychology the debate about nature versus nurture, continuity versus stages, and stability versus change are still ongoing. According to the nature position, human behavior and development are governed by automatic, genetically predetermined signals in a process known as maturation. Humans crawl before we walk and walk before we run. One of several critical periods during our lifetime is, when an organism is especially sensitive to certain experiences that shape the capacity for future development. On the other side of the debate, those who hold an extreme nuturist position argue that development occurs by learning through personal experience and observation of others. Continuity proponents believe that development is continuous, with new abilities, skills, and knowledge being gradually added at a relatively uniform pace. Therefore, the continuity model suggests that adult thinking and intelligence differ quantitatively from a childs. Stage theorists, on the other hand, believe that development occurs at different rates, alternating between periods of little change and periods of abrupt, rapid change. Psychologists who emphasize stability in development hold that measurements of personality taken during childhood are important predictors of adult personality. Of course, psychologists who emphasize change disagree. Like the nature versus nurture debate, the debates about continuity versus stages and stability versus change are not a matter of â€Å"either-or. Physical development and motor skills, for example, are believed to be primarily continuous in nature, whereas cognitive skills usually develop in discrete stages. Similarly, some traits are stable, whereas others vary greatly across the life span. The physical development in childhood is rapid, the brain and other parts of the nervous system grows faster than any other part of the body. By age 6, the child’s brain is 9/10 its full adult weight. Rapid brain growth during early childhood slows down in later childhood. Further brain development and learning occur primarily because neurons grow in size and because the number of axons and dendrites, as well as the extent of their connections, increases. Adolescence is the loosely defined psychological period of development between childhood and adulthood. We consider it to be the teenage years. The concept of adolescence and its meaning varies greatly across cultures. Cognitive development for childhood age 2 – 7 is known as preoperational and has the ability for significant language and thinks symbolically. Piaget labeled this period â€Å"preoperational† because the child lacks operations, or reversible mental processes. Children at this stage have difficulty understanding that there are points of view other than their own. Egocentrism refers to the preoperational childs limited ability to distinguish between his or her own perspective and someone elses. It does not mean â€Å"selfishness† in the ordinary sense of the word. The preschooler who moves in front of you to get a better view of the TV or repeatedly asks questions while you are talking on the telephone is demonstrating egocentrism. They assume that others see, hear, feel, and think exactly as they do. Children in the preoperational stage believe that objects such as the sun, trees, clouds, and bars of soap have motives, feelings, and intentions. From age 7 – 11 it is known as concrete operational and has the ability to perform operation on concrete objects and understands conservation. Because they understand the concept of reversibility, they recognize that certain physical attributes such as volume remain unchanged when the outward appearance of an object is altered, a process known as conservation. The final stage in Piagets theory is the formal operational stage, which typically begins around age 11. In this stage, children begin to apply their operations to abstract concepts in addition to concrete objects. They also become capable of hypothetical thinking â€Å"What if? † which allows systematic formulation and testing of concepts. Along with the benefits of this cognitive style come several problems. Adolescents in the early stages of the formal operational period demonstrate a type of egocentrism different from that of the preoperational child. Although adolescents recognize that others have unique thoughts and perspectives, they often fail to differentiate between what they are thinking and what others are thinking. Social behavior becomes more evident in childhood, and research shows that children raised in impersonal surroundings such as in institutions that do not provide the stimulation and love of a regular caregiver or under abusive conditions suffer from a number of problems. They become rigid when picked up; and they have few language skills. They also tend to form shallow or anxious relationships. Some appear forlorn, withdrawn, and uninterested in their caretakers, whereas others seem insatiable in their need for affection. They also tend to show intellectual, physical, and perceptual retardation; increased susceptibility to infection; and neurotic â€Å"rocking† and isolation behaviors. In some cases, they die from lack of attachment. Morals at the childhood stage are considered to be a focus on self-interest, obedience to authority and avoidance of punishment. Because they also have difficulty considering anothers point of view, they ignore peoples intentions in their moral judgments. Children in their childhood also become aware of others perspectives, but their morality is based on reciprocity, an equal exchange of favors. Preschoolers learn to initiate activities and enjoy their accomplishments. Caregivers who are supportive and encouraging promote feelings of power and self-confidence versus guilt. Elementary school-aged children develop a sense of industry and learn productive skills that their culture requires, such as reading, writing, and counting; if not, they feel inferior. Personality describes you as a person, how you are different from other people, and what patterns of behavior are typical of you. There are five basic personality traits. These five major dimensions of personality are often dubbed the Big Five. To remember the five factors is to note that the first letters of each of the five-factor model spell the word ocean. O  Ã‚  | Openness. People who rate high in this factor are original, imaginative, curious, open to new ideas, artistic, and interested in cultural pursuits. Low scorers tend to be conventional, down-to-earth, narrower in their interests, and not artistic. Interestingly, critical thinkers tend to score higher than others on this factor (Clifford, Boufal, Kurtz, 12. 18). | | C  Ã‚  | Conscientiousness. This factor ranges from responsible, self-disciplined, organized, and achieving at the high end to irresponsible, careless, impulsive, lazy, and undependable at the other. | | E  Ã‚  | Extroversion. This factor contrasts people who are sociable, outgoing, talkative, fun loving, and affectionate at the high end with introverted individuals who tend to be withdrawn, quiet, passive, and reserved at the low end. | A  Ã‚  | Agreeableness. Individuals who score high in this factor are good-natured, warm, gentle, cooperative, trusting, and helpful, whereas low scorers are irritable, argumentative, ruthless, suspicious, uncooperative, and vindictive. | | N  Ã‚  | Neuroticism (or emotional stability). People who score high in neuroticism are emotionally unstable and prone to insecurity, anxiety, guilt, worry, and moodiness. People at the other end are emotionally stable, calm, even-tempered, easygoing, and relax. | The five-factor model is the first to achieve the major goal of trait theory, to describe and organize personality characteristics using the fewest number of traits. Critics argue, however, that the great variation seen in personalities cannot be accounted for by only five traits and that the Big Five model fails to offer causal explanations for these traits. Finally, trait theorists have been criticized for ignoring the importance of situational and environmental effects on personality. Numerous methods have been used over the decades to assess personality. Modern personality assessments are used by clinical and counseling psychologists, psychiatrists, and others for diagnosing psychotherapy patients and for assessing their progress in therapy. Personality assessment is also used for educational and vocational counseling and to aid businesses in making hiring decisions. Personality assessments can be grouped into a few broad categories: interviews, observations, objective tests, and projective tests. Objective personality tests, or inventories, are the most widely used method of assessing personality, for two reasons. They can be administered to a large number of people relatively quickly and the tests can be evaluated in a standardized fashion. Unlike objective tests, projective tests use unstructured stimuli that can be perceived in many ways. As the name implies, projective tests supposedly allow each person to project his or her own unconscious conflicts, psychological defenses, motives, and personality traits onto the test materials. Because respondents are unable or unwilling to express their true feelings if asked directly, the ambiguous stimuli reportedly provide an indirect â€Å"psychological X-ray† of important unconscious processes. As you can see, each of these methods has its limits. Psychologists typically combine the results from various methods to create a full picture of an individuals personality. After all the tests and all the studies, are mind, body and soul will always be one step away from being a mystery. References http://e-courses. cerritos. edu writerscafe. org brainmass. com runet. edu