Wednesday, December 25, 2019

Physician Assisted Suicide Ethically Justified - 2126 Words

Physician Assisted Suicide Introduction, Outline and Reference Tracy Pietrzak Philosophy of Ethics Professor John Schmitz February 2, 2015 Introduction Is physician assisted suicide ethically justified? Physician-assisted suicide (PAS) is defined as ending one’s own life by taking a fatal dosage of a substance with the direct or indirect assistance of a physician (MedicineNET.com, 2015). PAS is a very sensitive and controversial topic that raises many moral and ethical questions. While some feel that a person should be able to die with dignity and under their own terms, others feel that this is not a choice we can ethically make. PAS recently made national headlines when Brittany Maynard, a twenty-nine year old woman diagnosed with stage IV glioblastoma, went public with her plan to end her own life under Oregon’s Death with Dignity Act that was passed in 1997. Maynard legally received a prescription from her physician for a lethal dose of barbiturates and decided to end her life own life instead of suffering the painful death that loomed in her near future. She ended her own life on November, 3, 2014 with her fam ily by her side (Durando, 2014). There are many moral issues that surrounded Maynard’s decision and whether or not PAS is ethical, however it is important to understand both sides of the debate to truly get the entire picture of the complexity of this issue before making the determination if physician-assisted suicide is ethically justified.Show MoreRelated Physician-Assisted Suicide is Morally and Ethically Acceptable1160 Words   |  5 Pages   Ã‚  Ã‚   The long time debate over medically assisted suicide, the presence of a doctor at a patient’s suicide, resurfaced again with the conviction of doctor Jack Kevorkian.   Kevorkian was convicted of second degree murder when he euthanized, or administered the injection himself, Thomas Youk on September 17, 1998.   Dr. Kevorkian, an advocate and practitioner of medically assisted suicides, has many opponents on the issue. Opponents say that it is unethical and even with the consent of the patientRead MorePhysician Assisted Suicide, When Is It Acceptable?1709 Words   |  7 PagesPhysician-Assisted Suicide, When is it acceptable? Assisted suicide had raised issues of great importance in the society particularly the most controversial of all, the physician assisted suicide in the health care field. Since Oregon and other states implemented the legalization of physician assisted suicide, the debates continues. The U.S. Supreme Court decisions in 1997 and the Pain Relief Promotion Act of 2000 (H.R. 5544) have kept these topics on the policy of the national agenda, along withRead MoreMy Ethical Views on Physician Assisted Suicide Essay1598 Words   |  7 PagesMy Ethical Views on Physician Assisted Suicide Physician assisted suicide is immoral in the case of people who are alive and desire to terminate their life. However, there are extreme cases when hastening the dying process is justified in the circumstances of individuals who are in intense physical impairment. Physician-assisted suicide is defined as the practice where a physician provides a patient with a lethal dose of medication, uponRead MorePhysician Assisted Suicide is NOT Ethical Essay1347 Words   |  6 PagesIs physician assisted suicide morally right? This has been a controversial subject for some time now. People are wondering whether or not it is the most humane thing to do. If dogs can be putdown, why not people? The reason is in that question. They are people. Every life is important, no matter how long it may be. Instead of finding a way to get rid of people faster, the government could put those efforts in something more positive. If other people are considering whether or not the patients’ lifeRead MoreThe Suicide Of A Patient Essay970 Words   |  4 Pages â€Å"The suicide of a patient suffering from an incurable disease, effected by the taking of lethal drugs provided by a doctor for this purpose,† is the dictionary definition of assisted suicide, or assisted death. Much debate has taken place over whether or not this should be a right of the terminally ill, and whether a doctor can grant that wish. Although modern medicine has brought a multitude of benefits to humanity, it cannot relieve the pain and suffering associated with the dying process. Read More Assisted Suicide Essay824 Words   |  4 Pageseuthanasia and assisted suicide. Most people who believe that assisted suicide should be legalized argue that individuals should have control over the timing and manner of their own deaths. Some argue that actively bringing about one’s death is no different legally than refusing the life-sustaining treatment that is offered. Opponents feel that legalizing assisted suicide will cause many problems. Most importantly, they fear that vulnerable individuals may be coerced into suicide as a result ofRead MorePhysician Assisted Suicide Should Be Legalized For Mentally Competent Adults1340 Words   |  6 PagesErin Presnell Professor Branson English 112 2 May 2015 Physician Assisted Suicide Assisted suicide is a controversial and often misunderstood topic that has recently raised the attention of the nation. Assisted suicide or physician assisted suicide (PAS) is not only an emotionally trying matter but also ethically challenging to some. Those who are against this act believe that it is unethical to end a life before the intended time. Those in favor believe that it is a human right for patients thatRead MoreEuthanasi The Issue Of Euthanasia1675 Words   |  7 Pagespainful disease intended as an act of mercy (Newhealthguide.org, 2016). Euthanasia is closely related to doctor assisted suicide. However, the two acts differ in that, euthanasia means injecting a terminally sick patient with lethal dose of a drug or withdrawing feeding tubes to let the patient die of starvation. Assisted suicide on the other hand refers to the process where a physician avails a lethal drug to the patient. The patient or his/her next of kin usually must consent to the action. By JanuaryRe ad MoreBouvia V. Superior Court1645 Words   |  7 Pagesplaced a nasogastric tube to forcefully provide supplemental nutrition to keep her alive. Ms. Bouvia was very upset about this treatment modality and felt that she had the right to refuse care therefore in 1986 she filed a civil suit against her physician and healthcare team in the Los Angeles Superior Court due to their refusal to honor her wishes. Elizabeth Bouvia v. The Superior Court of Los Angeles County became a pivotal case in a patient’s right to refuse treatment. In the initial case MsRead MoreShould Euthanasia Be Legal?1635 Words   |  7 Pagesdeaths. We claim to be free people but someone else’s morals and standards could possibly govern the way we die. Medicine today makes it possible for patients who are living with unbearable pain to choose to die peacefully and with dignity. Physician-assisted suicide or active, voluntary euthanasia for an adult who is in a rational state of mind and whose suffering happens to be unbearable despite the strongest medical efforts, is an idea that should to be put into action. Euthanasia ought to be put

Tuesday, December 17, 2019

External Auditing Of Information Security - 1634 Words

External Auditing of Information Security Yue Dai ACC 412 Auditing Belhaven University 8/1/2015 Abstract This paper is meant to be a guide for general readers including IT professionals, external auditors and so on. This research paper has a main focus on the external auditing of information security. It provides a basic understanding of the reasons for external auditing of information security. It is also meant as an aid for auditors to have solutions and Biblical implications and other possible recommendations. A variety of research techniques are used in this passage, such as analysis of files, writing questions, listing examples and making conclusions. In conclusion, It is essential that IT and audit work together in†¦show more content†¦As part of this, external auditors often examine and evaluate internal controls used in managing the risks which could affect the financial accounts, to determine if they are working properly. Information security - Information security is way of protecting information from being stolen or revised. All companies have secret information and they should protect them from other people who might take advantage of them. Once the security got hacked, it can lead companies to serious situations and they may face huge loss. Therefore the information security audit (IS audit) are intended to improve the level of information security to maintain a certain level of security in an organization. Information security audit - An information security audit is an audit of the organization s level of information security.(Wikipedia) It can be seen as a part of an information technology audit when centered on the IT aspects of information security. Information technology (IT) audits assess the controls, accuracy, and integrity of an institution’s electronic data processing and computer areas. Information security audit is often then referred to as an information technology security audit. ITs usually have the duty to protect confidential information. Internal control - The power point slide in the Lecture 4 defines Internal control as: Internal control is broadly defined as a

Sunday, December 8, 2019

Over Voltage and Under Voltage Control Using Relay Essay Sample free essay sample

IntroductionThe protection system is one O the of import facet on which major makers is concentrating. The companies like L A ; T. SIMENS etc. The protection system non merely provides lastingness to the equipment but besides avoid jeopardies. The protection system is one of the major Fieldss in the electrical technology. There are different types of protection systems out of that really common and of import 1 is the electromotive force protection system. Normally all the electrical equipments are specified with a specific electromotive force scope for its safe operation. When of all time those equipments are applied with a electromotive force more so the upper specified limit the system may pull extra current which may do to fire the equipment. The equipment is designed to defy a specific electromotive force when of all time the electromotive force goes beyond the bound value so automatically the insularities used in that equipment acquire punctured and do a harm to the equipment. Similarly whenever the equipment is applied with a electromotive force lower so the lower specified electromotive force it draws extra current to keep the efficiency. The out put may non be proper and the equipment may damage. The complete electromotive force and under electromotive force relay in combination protect the device from fluctuation of electromotive force. This type of relay provides the equipment complete protection against unsought electromotive force status. The complete electromotive force and under electromotive force relay is one of the of import protective relays which is used in the practical application at industries to protect motors transformers and other electronic and electrical equipment and power system. DESIGN PRINCIPLE:The complete electromotive force and under electromotive force relay is designed utilizing possible transformers ( PT ) . There is a PT used to try the line electromotive force and converts into DC value. The DC value obtained at the rectifier and filter out put is correspondent to the AC line electromotive force amplitude. The filter is designed with a clip invariable more so five clip period ( 5T ) . The sampling electromotive force obtained at the rectifier filter out put of the PT alterations after 5T merely. In this mode the sampling electromotive force is made immune to the effects of spiks. The sampled electromotive force is feed to two different comparators holding mention electromotive forces correspondent to the under electromotive force and over electromotive force scene. Whenever the sample electromotive force goes beyond the mention electromotive force set for over electromotive force status so comparator end product goes high and a mistake status is det ected. Similarly whenever the sample electromotive force goes bellow the mention electromotive force set for under electromotive force status in the other comparator the end product goes high and a mistake status is detected. The end products of both the comparators are feed to a logic gate to bespeak the mistake status when of all time any of the comparator issues a mistake determination. The out put of the logic gate is feed to the bistable / latch and so relay driver and doorbell driver to protect the equipment from the mistake status and bespeak the mistake happening by blowing the doorbell. CIRCUIT DESCRIPTIONa. Power supply Circuit connexion: – In this we are utilizing Transformer ( 0-12 ) v. 1Amp. IC 7812. rectifying tubes In 4007. LED A ; resistances. Here 230V. 50 Hz ac signal is given as input to the primary of the transformer and the secondary of the transformer is given to the span rectification rectifying tube. The o/p of the rectifying tube is given as i/p to the IC regulator ( 7812 ) through capacitance ( 1000mf/35v ) . The o/p of the IC regulator is given to the LED through resistances. Circuit Explanations: – When ac signal is given to the primary of the transformer. due to the magnetic consequence of the spiral magnetic flux is induced in the spiral ( primary ) and reassign to the secondary spiral of the transformer due to the transformer action. † Transformer is an electromechanical inactive device which transformer electrical energy from one spiral to another without altering its frequency† . Here the rectifying tubes are connected in a span manner. The secondary spiral of the transformer is given to the span circuit for rectification intents. During the +ve rhythm of the ac signal the rectifying tubes D2 A ; D4 behavior due to the forward prejudice of the rectifying tubes and rectifying tubes D1 A ; D3 does non carry on due to the reversed prejudice of the rectifying tubes. Similarly during the –ve rhythm of the ac signal the rectifying tubes D1 A ; D3 behavior due to the forward prejudice of the rectifying tubes and the rectifying tubes D2 A ; D4 does non carry on due to reversed prejudice of the rectifying tubes. The end product of the span rectifier is non a power District of Columbia along with crinkled Ac is besides present. To get the better of this consequence. a capacitance is connected to the o/p of the rectifying tubes ( D2 A ; D3 ) . Which removes the unwanted ac signal and therefore a pure District of Columbia is obtained. Here we need a fixed electromotive force. that’s for we are utilizing IC regulators ( 7805 A ; 7812 ) . †Voltage ordinance is a circuit that supplies a changeless e lectromotive force regardless of alterations in burden current. † This IC’s are designed as fixed electromotive force regulators and with equal heat sinking can present end product current in surplus of 1A. The o/p of the span rectifier is given as input to the IC regulator through capacitance with regard to GND and therefore a fixed o/p is obtained. The o/p of the IC regulator ( 7805 A ; 7812 ) is given to the LED for indicant intent through resistance. Due to the forward prejudice of the LED. the LED freshnesss ON province. and the o/p are obtained from the pin no-3. B. Under voltage/over electromotive force sensor In this subdivision our purpose is to observe the line changing electromotive force. The line electromotive force ( 230vac ) coming from the brinies is to be step down that electromotive force with the aid of a measure down transformer. If the line electromotive force varies. the measure down electromotive force besides varies in conformity with the input electromotive force. Due to the common initiation of the transformer. if the primary twist of the transformer electromotive force is more the flux induced is more and the secondary electromotive force is more. Similarly. if the primary twist of the transformer electromotive force is less the flux induced is less and the secondary electromotive force is less. In this manner under/over electromotive force occurs. The above figure shows a half-wave rectifier. in which it will change over Ac to dc electromotive force. We can change the electromotive force with the variable burden opposition ( 10k ) The sample electromotive force can be calibrated by changing the burden opposition RL The of import portion of this design to try the electromotive force accurately as an reproduction of the line electromotive force. The measure down transformer samples the line electromotive force at a decreased signal electromotive force Vac = ( N2/N1 ) *VL The DC electromotive force after the half moving ridge rectifier is about Vm due to the charging of the capacitance. this capacitance electromotive force represents the line electromotive force. The clip invariable of the circuit is defined by C*RL. The clip invariable of the circuit must be more so five times of the clip period of the signal. RC gt ; 5T. If the RC value is less the 5T so the sample electromotive force fluctuates unnecessarily. if the RC value is excessively high the trying response becomes excessively slow. Operation: The end product of the signal sampling electromotive force ( 3v ) goes to the input of both of the comparator. In the first comparator we have set the electromotive force say 3. 5Vto the non-inverting terminus. In this instance non-inverting terminus is greater than the inverting terminus. That means end product of the first comparator is Low. At present under temperature can ( t be done because the room temperature will be ever available If we want ( s to make under temperature. we have to change or alter the set point which is connected to the inverting terminus of that comparator. Similarly. for the 2nd comparator we have set the electromotive force say 4V to the inverting terminus. In this instance inverting terminus is greater than the non-inverting terminus that means end product of the 2nd comparator is HIGH. If the temperature increases. the corresponding electromotive force will increase state 4. 5V. That electromotive force goes to the input of both of the comparator. In the first comparator we have set the electromotive force say 3. 5Vto the non-inverting terminus. In this instance inverting terminus is greater than the non- inverting terminus. That means end product of the first comparator is HIGH this means that over temperature has occurred. Similarly. for the 2nd comparator we have set the electromotive force say 4V to the inverting terminus. In this instance non- inverting terminus is greater than the inverting terminus that means end product of the 2nd comparator is LOW. c. NOR gateOR GateThe OR gate is besides called as â€Å"any or all† gate. The OR gate is the combinable logic circuit which has merely one end product and may hold any figure of inputs. The end product is when any one or more than one of the input is 1 and the end product is 0 merely when all the input is 0. In the above figure. a rectifying tube OR gate is shown. It is clear from this circuit if at A +5v input is applied. it will send on colored transistor diode-1 and the end product electromotive force at C will be +5v i. e. . if input A is 1. the end product C will besides be 1 irrespective of input B. likewise. if input to B is 1. the end product at C will besides be 1. irrespective of input to A. the end product C will be 0 merely when both the rectifying tubes are nonconductive i. e. both input are 0 i. e. A=0 and B=0 NOT GATE Introduction: The application of the transistors is non limited entirely to the elaboration of the signals. Through proper design transistors can be used as switches for computing machines and control applications. The web of figure-01 ( a ) can be employed as an inverter in computing machine logic circuitry. Note that the end product electromotive force Vc is opposite to the applied to the base or input terminus. In add-on note the absence of dc supply connected to the base circuit. The lone District of Columbia beginning is connected to the aggregator or end product side. and for computing machine applications is typically equal to the magnitude of the â€Å"high† side of the applied signal – in this instance 5V. Operation: Proper design for the inversion procedure requires that the operating points switch from cut-off to impregnation along the burden line depicted in above figure ( B ) . For our proposes we will presume that IC = ICEO = 0mA. when IB = 0 µA ( an first-class estimate in visible radiation of bettering building techniques ) . as shown in above figure ( B ) . In add-on. we will presume that VCE = VCE sat = 0V. When Vi = 5v. the transistor will be â€Å"ON† and design must see that the web is to a great extent saturated by a degree of IB greater than that associated if the IB curve looking near the impregnation degree. In the above figure ( B ) . this requires that IB gt ; 50 µA. The impregnation degree for the aggregator current for the circuit is defined by. IC = VCC – VCE / RC= 5V – 0. 2V / 10K= 480 µA The degree of IB in the active part merely before impregnation consequences can be approximated by the undermentioned equation. IB min ? IC sat / ?dc=480 µA / 300=1. 6 µAFor the impregnation degree we must therefore insure that the undermentioned status is satisfied: IB max gt ; IC sat / ?dcFor the web of the above figure ( B ) . when Vi = 5v the ensuing degree of IB is AssumeIB = 100 µA5v – RB IB – 0. 7v = 0RB ( soap ) = 4. 3 / 100 µA = 43k?RB ( min ) = 4. 3 / IB ( soap ) = 1k? Which is satisfied. Surely any degree of IB greater than 16 µA will go through through a Q- point on the burden line that is really near to the perpendicular axis. d. Bistable / LatchIntroductionThe latch is the electronics device which shops the province even if the input is with drawn. So this ca be started as a individual memory unit. The latch can be designed in many ways by utilizing a discreet constituent or reversal or a IC known as 555 timer. The Latch designed utilizing 555 timer IC is rather stable. Ckt Connection: The threshold electromotive force pin-6 of IC555 is connected to land and the trigger pin-2 a pull-up resistance 10k is connected to VCC usually. Whenever the threshold electromotive force is low. the end product of the comparation-1 hellishly. the end product of the flip-flop goes low. And the input of the comparator – 2 internally high than 1/3 Vcc. the end product will stay in ‘LOW’ sate. Whenever a negative border trigger electromotive force will look at the trigger pin-2. internally the end product of the comparator – 2 goes high. the reversal will stay in high province and it will latch that end product. Until we have to reset that IC through reset pin-4 to land. Operation The 555 timer IC contain two comparators at its input. one terminal of the comparator is connected to the 1/3 Vcc and 2/3 Vcc severally. The other two terminus of both the comparator are named as trigger and threshold. The end product of these two comparators are connected to a S-R somersault –flop in which end product toggles when the inputs are dissimilar i. e. 1. 0 or 0. 1. The Bistable design gas two inputs. one as trigger input to alter the province and the other is to reset the end product. The input signal is connected to the trigger pin and the threshold is grounded. It means the end product of the comparator to which 2/3 Vcc is connected and threshold ( land ) is kept at fixed end product. When the trigger pin is issued with an input which is less than 1/3 Vcc so automatically the comparators end product toggles and therefore the somersault floating-point operation end product toggles and the end product of the 555 timer IC is set. The end product remains in the provi nce until unless the reset input is pulled down to land. e. Relay driver In this subdivision we have taken electro magnet relay to command the electrical contraptions we have taken a 12v relay whose opposition is 400? which requires 30mA current to drive or to do it ‘ON’ / ‘OFF’ . The end product of the reversal is given as input to the relay driver ( as we know. the end product of the reversal is a TTL IC which gives a end product current 50 µA. Therefore. we need a driver ckt to drive the relay. The driver is configured as a transistor acts as a switch. Whenever the base electromotive force is high through a base opposition 1. 5 K and the aggregator is connected to the relay spiral. which as a opposition Rc 400? . the transistor comes to saturation status i. e. ‘ON’ province because the emitter current will flux to the aggregator part. which makes the spiral as electro magnet. The relay driver is design by utilizing a BC547 transistor. The relay used here holding the specification as follows ? Coil opposition =400ohm? Coil voltage=12Vdc? Contact capacity=230V. 7AThe above specification indicates that the spiral requires 12V District of Columbia and 200mA current District of Columbia. The TTL can’t supply more so 20 µA current. So driver subdivision is really much required. BC547 has a typical current addition of 200 and maximal current capacity of 1A. So a typical base current of 10 ( A can trip to on the relay. ELECTRO MAGNETIC RELAY These are really much dependable devices and widely used on field. The operating frequence of these devices are minimal 10-20ms. That is 50Hz – 100Hz. The relay which is used here can care 25mA currents continuously. The electromagnetic relay operates on the rule magnetic attraction. When the base electromotive force appears at the relay driver subdivision. the driver transistor will be driver transistor will be driven into impregnation and let to flux current in the spiral of the relay. Which in bend create a magnetic field and the magnetic force produced due to that will move against the spring tenseness and shut the contact spiral. Whenever the base electromotive force is withdrawn the transistor goes to cutoff. So no current flow in the spiral of the relay. Hence the magnetic field disappears so the contact point interruptions automatically due to spring tenseness. Those contact points are isolated from the low electromotive force supply. so a high electromotive force shif t is possible by the aid of electromagnetic relays. The electromagnetic relays usually holding 2 contact points. Named as usually closes ( NC ) . usually unfastened ( NO ) . Normally closed points will so a short CKT way when the relay is away. Normally unfastened points will so a short CKT way when the relay is energized. f. Buzzer driver The doorbell driver consists of a doorbell A ; its driving ckt. It works on the rule of transistor action ( Transistor acts as a switch ) . When the base electromotive force is high. the transistor comes to saturation i. e. in ON status. which drives the doorbell because a little emitter current will flux. Similarly. when the base electromotive force is low. the transistor does non come to saturation i. e. OFF status. which does non drives the doorbell. Future ExpansionThis undertaking is designed with restriction to clip and cost. The complete electromotive force and under electromotive force relay that is designed here can be modified to interface multiple parametric quantities such as temperature and current etc. The interface of micro accountant can do the system more various and smarter. Decision The complete electromotive force and under electromotive force relay that is designed here in the research lab and tested in the research lab status. And found to be runing satisfactory the set points are set at the restricting value and the practical tripping of the relay is within the bounds of experimental mistakes.

Sunday, December 1, 2019

Thirty Years War Essay Example For Students

Thirty Years War Essay The causes of the Thirty Years War can be traced as far back as the renaissance period. It was during the renaissance that such ideals as secularism, humanism, individualism, rationalism and above all else secularism were first apparent in main stream society. These ideas led to the protestant reformation, which is an even more direct cause of the war. The split of the Catholic Church, as a result of the protestant reformation left Europe in a state of religious turmoil and chaos. The gradual increase in intolerance and religious sectionalism that coincided with the addition of new religions and even more diversity has been marked as the main cause of the Thirty Years War. The effects of the war would prove to be devastating to most of Europe, evidenced by the sharp drop in population, but it was especially devastating to Germany. However, there were some countries and bodies of people that emerged from the conflict improved such as France, Sweden, and the religion of Calvinism. Ther e were many territorial and dynastic issues that figured in the outbreak and conduct of the war as well, but it is believed that these factors did not become important until the middle stages of the war. The territorial and dynastic causes, which go hand in hand, did however, cause the war to continue longer than it most likely would have if religion had been the only motive. The extent of religious motives therefor is debated, but cannot be dismissed. The immediate causes of the war began with the resistance and eventual revolt of Protestant nobles in Bohemia, due to the religious intolerance mentioned before, which was under Hapsburg domination, against the Catholic king Ferdinand. The reasons and causes for its spread throughout Europe include the constitutional frailty of the Holy Roman Empire, the inability of the German states to act in concert, and the ambitions of other European powers. These were the causes that would eventually be responsible for the war lasting as long as it did. We will write a custom essay on Thirty Years War specifically for you for only $16.38 $13.9/page Order now The political motives became more and more prevalent when Sweden entered the war to help the Protestant cause. Sweden did not enter the war for religious reasons at all; they were looking to gain land. Finally it seemed that religion was completely forgotten and abandoned as a cause when Catholic France and Protestant Sweden joined forces against the Catholic Hapsburgs. France was worried that the Hapsburgs were becoming too powerful so they decided to assert their influence into the war. The results and effects of the war and the two peace treaties were highly significant. France replaced Spain as the greatest power in Europe. With Sweden, France had blocked the Habsburg efforts to strengthen their authority in the Empire. At Westphalia, the right of the individual states within the Empire to make war and conclude alliances was recognized. In theory as well as in fact, the most important of these states became virtually autonomous, and German unity was postponed for more than two centuries. The Empire was further dismembered by the recognition of the independence of Switzerland and the seven northern provinces of the Netherlands. Two new powers emerged in northern Germany. France received most of Alsace by the Treaty of Westphalia, and by the Treaty of Pyrenees parts of Flanders and Artois in the Spanish Netherlands and lands in the Pyrenees. The religious settlement at Westphalia confirmed the predominance of Catholicism in southern Germany and of Protestantism in northern Germany. The principle accepted by the Peace of Augsburg of 1555 that Catholic and Lutheran princes could determine the religion practiced in their territory was maintained, and this privilege was extended to include the Calvinists as well. .ue75b2bf065b95af2d78ba133901b9581 , .ue75b2bf065b95af2d78ba133901b9581 .postImageUrl , .ue75b2bf065b95af2d78ba133901b9581 .centered-text-area { min-height: 80px; position: relative; } .ue75b2bf065b95af2d78ba133901b9581 , .ue75b2bf065b95af2d78ba133901b9581:hover , .ue75b2bf065b95af2d78ba133901b9581:visited , .ue75b2bf065b95af2d78ba133901b9581:active { border:0!important; } .ue75b2bf065b95af2d78ba133901b9581 .clearfix:after { content: ""; display: table; clear: both; } .ue75b2bf065b95af2d78ba133901b9581 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ue75b2bf065b95af2d78ba133901b9581:active , .ue75b2bf065b95af2d78ba133901b9581:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ue75b2bf065b95af2d78ba133901b9581 .centered-text-area { width: 100%; position: relative ; } .ue75b2bf065b95af2d78ba133901b9581 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ue75b2bf065b95af2d78ba133901b9581 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ue75b2bf065b95af2d78ba133901b9581 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ue75b2bf065b95af2d78ba133901b9581:hover .ctaButton { background-color: #34495E!important; } .ue75b2bf065b95af2d78ba133901b9581 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ue75b2bf065b95af2d78ba133901b9581 .ue75b2bf065b95af2d78ba133901b9581-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ue75b2bf065b95af2d78ba133901b9581:after { content: ""; display: block; clear: both; } READ: Biotechnology EssayThe Austrian Habsburgs had failed in their efforts to increase their authority in the Empire and to eradicate Protestantism, but they emerged from the war stronger than before. In Bohemia, they had stamped out Protestantism, broken the power of the old nobility, and declared the crown hereditary in the male line of their family. With Bohemia now firmly in their grasp and with their large group of adjoining territories, they were ready to expand to the east in the Balkans, to the south in Italy, or to interfere once more in the

Tuesday, November 26, 2019

Systems Analysis Essays

Systems Analysis Essays Systems Analysis Essay Systems Analysis Essay Systems analysis can be defined as a disciplined process, which begins with the establishment of user requirements for a given application and concludes with the implementation of fully operational system The main stages of systems analysis are often referred to as the system life cycle. The following sections give a brief overview of their functions within the systems analysis process. Feasibility study The aim of this stage is to establish whether or not a proposal for the computerisation of a particular application is worthwhile or feasible. In simple terms, the feasibility study has to answer questions such as: Will computerisation achieve the users objectives?; What type of system will be most suitable?; Will it be financially worthwhile? System investigation and design Assuming that the feasibility study produces a recommendation to proceed with computerisation of an application, then before any system specification is produced, an analysis has to be made of the processes and procedures involved in the application under consideration. For example, an analysis of Sales Order Processing should identify how orders are received, the order forms used and the procedures necessary to fulfil orders. Analysis is not simply the recording of an application as it currently operates through a variety of information gathering methods such as interviewing and observation, the requirements of a new system should be identified. Although the needs of the organisation are of obvious importance, employees are more likely to be concerned with matters of job satisfaction and working conditions. Successful implementation of a computerised system requires a great deal of work, involvement and willingness to co-operate by everyone concerned. If staff feel that their views have been considered such co-operation is more likely. Although users views are Important an outside observer can often identify problems with current practice which have never been questioned. A systems analyst from outside the firm needs therefore, to possess qualities of tact and diplomacy if his or her views are to be considered. The process of design should produce a complete picture of * the input, * processing, * storage and * output requirements of the new system. The picture will include * narrative descriptions, * flowcharts illustrating clerical procedures, * data flows and * the role of the computer in broad outline. The design of a computerised system should include as many improvements suggested in the investigation stage as is practicable and it will almost certainly be necessary to question tiers further when, for example, problems arise in the implementation of particular system requirements. Compromises will have to be made between what is desirable and what is practicable. Management and users may have specified requirements during the investigation stage, which prove either too expensive or extremely difficult to satisfy. System implementation System implementation or going live involves a range of preparatory. The main activities are as follow: * Development and/or testing of software. If an off the shelf system is chosen, then no development time is necessary, but testing is still vital. * File conversion. This is probably the most time-consuming activity in that all data relating to the application, which is currently held in manual files, has to be encoded onto the chosen magnetic storage medium. accuracy is vital and both software and clerical checking procedures should be employed. * Staff training and education. This may take a variety of forms but may be part of the proposals put forward by the chosen supplier. It is an extremely important activity if the systems effectiveness is to be maximised and if staff are to feel happy and confident in its operation. * Introduction of new clerical procedures. If the whole system is to function correctly, the computer processing aspect has to be supported by the clerical procedures designed to work with it. Part of staff training, therefore, has to be dedicated to purely clerical tasks such as the preparation of input data or source documents. * Choice of a changeover or going live plan. A number of alternatives are available and each has costs and benefits associated with it. Parallel running, requires that the old and new systems be operated alongside one another until the new system is fully tested. This minimises the risks consequent upon system failure, it is an expensive option in that it involves a great deal of staff time. Direct changeover is less expensive if the new system works but failure could mean catastrophe for the business. The plan used will depend on a number of factors, for example, the importance of the system to the success of the business. System maintenance After its initial introduction a system should be flexible to the changing needs of the business. An allowance for the businesss expansion should be made in the original system specification and the supplier should be able to satisfy those expansion needs as and when necessary. Equally, advances in hardware technology and the sophistication of software mean that a system soon becomes outdated. Even if a business chooses not to take advantage of improved software, hardware is likely to become less reliable and will need replacement after about five years of business use. Agreements on software and hardware maintenance should be established with the supplier and formalised in the contract signed by purchaser and supplier. The Feasibility Study The purpose of a feasibility study is to determine whether or not the purchase of a computer system can be justified. The study has to answer two fundamental questions: 1. Can the envisaged applications be carried out by a computer system more efficiently than with existing facilities?; 2. Will a computer system be economically viable?. Since the early 1 970s, prices of all types of computer system have fallen dramatically and their power has increased to such a degree that, for example, microcomputers challenge the minicomputer in their range of applications. This may be part of the reason why many organisations find it difficult to justify undertaking a detailed feasibility study and argue that no matter how limited their needs there is a computer system to satisfy them at a cost-effective price; it is only necessary to decide on its best application(s). Although this is an understandable view, it should be remembered that any item of equipment should be justified in terms of its costs and benefits to the business and that a computer system should be no exception. Although there are few businesses, which cannot benefit from computerisation at all, the process of carrying out a feasibility study disciplines the purchaser to think carefully about how it is to be used. In modifying the purpose of a feasibility study, the previous questions can be replaced by the following: 1. Which applications can be computerised to give most benefit to the organisation?; 2. What type of computer will be required?; 3. What are the likely acquisition and running costs?; 4. What are the likely implications, especially those concerning personnel and organisational procedures?. Pressures for computerisation There are many and various pressures which can trigger the thought of using a computer, either for the first time or, where a computer is already installed, for other applications still operated manually. Some examples are as follow: i. A business is expanding and to cope with the increased workload it appears that the only the alternative to computerisation is increased staffing. ii. A business is growing at such a rate that more information is needed to manage it properly. To obtain the information manually is too time-consuming and by the time it has been gathered is probably out-of-date. iii. Staff are being asked to work regular and increasing amounts of overtime and backlogs of work are building up. iv. Customers are complaining about the speed and quality of the service provided. v. Where stock is involved, it is difficult to keep track of stock levels and while some customer orders cannot be filled because of stock shortages, other stock is gathering dust on the shelves. vi. A great deal of advertising literature is constantly reminding business management that they are out-of-date and at a disadvantage with their competitors. vii. Other businesses providing a similar service use a computer. Examples (i), (ii) and (iii) suggest that the business is operating successfully and needs to take on extra staff or streamline its systems. Examples (iv) and (v) may be symptomatic of generally poor business management and in such cases, computerisation alone may not solve the problems. Examples (vi) and (vii) may tempt the management to computerise simply to keep up with the Joness. Although a computerisation programme resulting directly from one or more such pressures may be completely successful and worthwhile, the pressure itself should not be the reason for computerisation. Instead, management should establish the organisational objectives they wish to achieve through computerisation. Establishing objectives for computerisation It is important for management to establish what they are trying to achieve in terms of the overall objectives of the business and in the light of this, the objectives of the systems, which contribute to their achievement. For example, two major business objectives may be to improve the delivery of customers orders and to minimise the stock levels, which tie up valuable cash resources. The achievement of these objectives may involve contributions from several different information processing systems and the list may include the following. * Stock Control records stock movements and controls stock levels. * Purchasing responsible for the ordering of new supplies from suppliers. * Sales Order Processing receives customers orders and initiates the process of order fulfilment. * Purchase Ledger the accounting record of amounts owed and paid to suppliers of stock. * Invoicing the production of invoices requesting payment from customers for goods supplied. * Sales Ledger the accounting record of amounts owing by and received from customers for goods supplied. These and other applications within a business are interconnected by the information, which flows between them. Such connections can be illustrated with the use of data flow diagrams (DFD), which are described in Chapter 25. Establishing priorities for computerisation The applications which are going to bring greatest benefit to the business should be computerised first. Establishing individual system objectives The objectives of the relevant application must first be clearly understood. The following is a typical list for stock control serves to illustrate the definition of such objectives. * To maintain levels of stock which will be sufficient to meet customer orders promptly. * To provide a mechanism which removes the need for excessive safety margins of stock to cover customer orders. This is usually effected by setting minimum stock levels, which the computer can use to report variations below these levels. * To provide automatic re-ordering of stock items which fall below minimum levels. * To provide management with up-to-date information on stock levels and values of stocks held. Contents of the Feasibility Report The Feasibility Report should contain the following sections: Terms of reference These should set out the original purpose of the study, as agreed by management and detail the business objectives to be achieved, for example: (i) the improvement of customer service, such that orders are delivered within 24 hours of order receipt; (ii) the provision of more up-to-date management information on current stock levels and projected customer demand; (iii) a tighter control of the businesss cash resources, primarily through better stock management. Applications considered for computerisation The applications which may assist the achievement of the business objectives set out in the Terms of Reference are listed, for example: stock control; purchasing; sales order processing; invoicing; accounts. System investigations For each application under consideration there should be: * a description of the existing system; * an assessment of its good and bad points. For example, the sales order processing system may be slow to process customer orders and this results in poor delivery times, which in turn causes customers to take away their business; * an estimate of the costs of the existing system. For example, apart from the cost of staffing, an estimate has to be made of the cost of lost business, which could be avoided with an improved system. Envisaged system requirements This section should detail, in general terms, those aspects of each application which need to be improved and a broad outline of how each system may operate following computerisation. Costs of development and implementation These will include both capital costs and revenue or running costs. Capital costs are likely to be incurred for the following: (i) computer hardware; (ii) systems software and software packages (either off-the-shelf or tailor-made); (iii) installation charges for hardware and software; (iv) staff training. Revenue costs include those for the maintenance and insurance of the system. In addition, unless there are existing computer specialists in the organisation, additional suitable staff may need to be recruited Timescale for implementation This will depend on the scale of the operation, the type of application and whether or not packaged software is to be used. Expected benefits These are more difficult to quantify than the costs but may include, for example: * estimated savings in capital expenditure on typewriters and photocopiers; * more efficient stock management allows customer service to be maintained whilst keeping stock levels lower. This releases valuable cash resources and reduces possible interest charges on borrowed capital; * expansion in business turnover, without the need for extra staff and reduced overtime requirements. Other considerations The staff have to support any development for it to be properly successful and this usually means consultation at an early stage in the feasibility study and the provision of a proper staff-training programme. Customers must also be considered. For example, when a customer receives a computer produced invoice it should be at least as easy to understand as the type it replaced. Assuming that the feasibility study concludes that the proposed computerisation is worthwhile, according to the criteria set out in the report, then more detailed investigation and design can follow. System Investigation and Design Introduction If the feasibility report gives the go-ahead to the computerisation project, then a more detailed investigation of each candidate system begins. The facts gathered about each system will be analysed in terms of their bearing on the design and implementation of a computerised version. The objectives of the analysis are to gain a thorough knowledge of the operational characteristics of the current system and to settle, in a fair amount of detail, the way in which a computerised system will operate. It is extremely important that the new system does not simply computerise existing procedures. The design should, as far as possible, ignore existing departmental structures, which may inhibit the introduction of different and improved procedures. The aim of the investigation and design process is to produce a specification of users requirements in documented form. This is referred to as the Statement of User Requirements and will be used to tender for supply of hardware and software. Fact-finding methods There are several methods, which can be used to gather facts about a system: (i) interviewing; (ii) questionnaires; (iii) examination of records and procedure manuals; (iv) examination of documents; viii. observation. Each method has advantages and disadvantages and the method or methods chosen will depend on the specific circumstances surrounding the investigation, for example, the size of the business, the number of staff employed and their location and distribution. Interviewing This method has much to recommend it, in that the facts can be gathered directly from the person or persons who have experience of the system under investigation. On the other hand, a business with a number of geographically distributed branches makes the process of extensive interviewing expensive and time-consuming. Further, interviewing skills need to be acquired if the process is to be effective. The interviewer needs to know how to gain the confidence of the interviewee and ensure that the information, which is given, will be of value in the design of the new system. Questions need to be phrased unambiguously in order that the interviewee supplies the information actually required and a checklist of points will help to ensure that all relevant questions are asked. Of course, the interview may need to stray from the points in the checklist, if it becomes apparent that the interviewee is able to provide relevant information not previously considered. For example, clerical procedur es may be designed quite satisfactorily but may be made less effective because of personality conflicts between staff. Such tensions may only be revealed through personal interview. The interviewer also needs to detect any unsatisfactory responses to questions and possibly use alternative methods to glean the required information. Unsatisfactory responses include: * Refusal to answer. Such refusal may indicate, for example, that set procedures are not being followed and that the member of staff does not wish to be incriminated. * Answer with irrelevant information. It may be that the question is ambiguous and has to be re-phrased in order to elicit the required information. * Answer with insufficient information. If a system is to be designed which covers all foreseeable user requirements and operational circumstances, it is important that the analyst has all relevant information. * Inaccurate answer. The interviewer may or may not be aware that an inaccurate answer has been given but it is important that other sources of information are used to cross-check answers Questionnaires Questionnaires are useful when only a small amount of information is required from a large number of people, but to provide accurate responses, questions need to be unambiguous and precise. The questionnaire has a number of advantages over the interview: * each respondent is asked exactly the same questions, so responses can be analysed according to the pre-defined categories of information; * the lack of personal contact allows the respondent to feel completely at ease when providing information, particularly if responses are to be anonymous; * questionnaires are particularly suited to the gathering of factual information, for example, the number of customer orders received in one week; * it is cheap, particularly if users are scattered over a wide geographical area. A number of disadvantages attach to the use of questionnaires: * questions have to be simple and their meaning completely unambiguous to the respondents; * if the responses indicate that the wrong questions were asked, or that they were phrased badly, it may be difficult to clarify the information, particularly if the respondents were anonymous; * without direct observation it is difficult to obtain a realistic view of a systems operation. The questionnaire often provides only statistical information on, for example, volumes of sales transactions or customer enquiries. Examination of records and procedure manuals If existing procedures are already well documented, then the procedure manuals can provide a ready-made source of information on the way procedures should be carried out. it is important to realise that procedures detailed in manuals may not accord entirely with what actually happens. The examination of current records and the tracing of particular transactions can be a useful method of discovering what procedures are carried out. Special purpose records, which may involve the ticking of a box when an activity has been completed, can be used to analyse procedures, which are causing delays or are not functioning efficiently. The use of special purpose records imposes extra burdens on staff who have to record procedures as they happen and the technique should only be used when strictly necessary. Examination of documents It is important that the analyst examines all documents used in a system, to ensure that each: * fulfils some purpose, that is, it records or transmits information which is actually used at some stage. Systems are subject to some inertia, for example, there may have been a one-off requirement to record and analyse the geographical distribution of customers over a single month and yet the summary document is still completed because no-one told the staff it was no longer necessary; * is clear and satisfies its purpose, for example, a form may not indicate clearly the type of data to be entered under each heading. In any case, it may well require re-designing for any new system which is introduced. The documents, which should include, for example, source documents, report summaries, customer invoices and delivery notes, help to build a picture of the information flows which take place from input to output. Observation It is most important to observe a procedure in action, so that irregularities and exceptional procedures are noticed. Observation should always be carried out with tact and staff under observation should be made fully aware of its purpose, to avoid suspicions of snooping. The following list details some of the features of office procedures and conditions, which may usefully be observed during the investigation: * office layout this may determine whether the positioning of desks, filing cabinets and other office equipment is convenient for staff and conducive to efficient working; * work load this should indicate whether the volume of documents awaiting processing is fairly constant or if there are peak periods of activity; * delays these could show that there are some procedures which are constantly behind schedule; * methods of working a trained observer can, through experience, recognise a slow, reasonable or quick pace of working and decide whether or not the method of * working is efficient. It is important that such observations should be followed up by an interview to obtain the co-operation of the person under observation; * office conditions these should be examined, as poor ventilation, inadequate or excessive temperatures, or poor lighting can adversely affect staff efficiency. Often the observation will be carried out in an informal way but it may be useful on occasion to, for example, work at a users desk, so as to observe directly the way that customer orders are dealt with. It is important to realise that a user may put on a performance whilst under observation and that this reduces the value of the information gathered. Documenting the results of analysis A number of standard approaches, apart from narrative description, can be used to document the result of the system analysis, including: data flow diagrams (DFDs); organisation charts system flowcharts. Their applications are illustrated in the following section, which examines the categories of information, which need to be gathered and recorded during a system investigation. Categories of system information The major categories of information which need to be gathered involve: * functional relationships and data flows; * personnel and jobs; * inputs; * processes; * outputs; * storage. Functional relationships and data flows A business has a number of functional areas, such as Sales, Accounts, Stock Control and Purchasing, each having its own information system. However, the computerisation of a system in one functional area cannot be carried out without considering its effects on the rest of the business. Information systems within a business interact with and affect one another. The business, as an entity, also interacts with and is influenced by individuals and organisations in the surrounding environment and the businesss individual information systems should be co-ordinated to allow the achievement of overall business objectives. The data flows between individual functional areas can be illustrated with the use of a data flow diagram. Personnel and jobs It is possible to design a computerised system without involving staff, but it is likely to be less successful, partly because users can provide valuable insights into the practical aspects of system operation and partly because they will feel less motivated if they have had little or no influence on the final design. A formal organisation chart can be used to gain an overall picture of staff relationships and responsibilities but it should be borne in mind that designated and actual job responsibilities can differ radically. For example, it may turn out that a junior sales clerk is carrying out the checking of orders, which should be the responsibility of the sales supervisor. Thus, it may be necessary for the analyst to draw an alternative informal organisation chart to show the actual working relationships of staff. An example is given Apart from identifying working relationships between staff, it is useful to draw up brief job descriptions so that consultation on individual system procedures can take place with the appropriate staff. For example, a job description for a sales clerk may include the following activities: completion of standard order forms; checking stock availability; notification of orders to accounts. Therefore, although the sales departmental manager may have knowledge of such procedures, the sales clerk will have practical experience of their operation and should be consulted. System inputs A number of details concerning the data inputs to a system need to be established: * source. It may, for example, originate from a customer, a supplier, or another department in the business; * form. The data may arrive, for example, by telephone, letter, or a standard form such as an order form or suppliers invoice; * volume and frequency. For example, the number of orders received daily or weekly; * contents. For example. the individual items of data which appear on a suppliers invoice. Such information will allow the analyst to make recommendations on the most appropriate methods of computer input. The design of appropriate input methods also has to take account of several tasks involved with the collection and entry of data to a system: * recording. For example, the completion of a customer order form following receipt of a customer order by telephone; * transmission. For example, the order details may need to be transferred to another department or branch of the business for encoding and computer processing or they may be keyed in directly at the point of collection; * visual checking. It may be, for example, that a customer order has no quantities entered; * encoding. Verification procedures need to be designed to prevent transcription errors when data is encoded onto a computer storage medium for processing; * validation. Data is checked by a data vet program against set limits of validity, for example, account numbers may have to fall between a particular range of values. Thus, decisions need to be made concerning: (i) data collection procedures; (ii) methods for the transmission of data to the place of processing; (iii) data entry, data verification and data validation procedures. Data collection The designer needs to be aware of the available input technologies. These can be divided into two categories, keyboard entry and data capture technologies such as bar code reading, optical character reading (OCR) and optical mark reading (OMR), which allow direct input to the computer from specially designed input forms. Keyboard entry This is the most common method of input and requires the transcription of data from source documents. These can be designed to minimise the possibility of transcription errors at the data collection stage. Direct input Bar codes are pre-encoded and are thus immune from errors of transcription (assuming that the bar code is correct in the first place). Optical mark reading requires that pencil marks be used to indicate particular values from a limited set on a pre-designed form. Although no keyboard entry is required, mistakes may be made by the originator of the document and good design is therefore important. Data transmission It may be that no data transmission is necessary because the data is processed at the point of collection. For example, customer orders may be recorded on order forms at the sales desk and then taken into the next room for keying into the computer. Alternatively, the data may have to be transmitted some distance, perhaps to another floor of the building or to another building some miles away. A fundamental decision has to be made, whether to localise processing at the points of collection, or to use a central facility with data communications links from each location. Data entry The data entry method chosen will depend on the data collection methods used and may involve keyboard transcription from source documents or data may be captured directly from bar codes, OCR or OMR type documents. Where keyboard transcription is used, verification and validation procedures are likely to be interactive, in that the data entry operator has to respond to prompts on screen and make corrections as and when the system indicates Most small business computer systems will be used for on-line processing, where transactions are processed immediately with master files at the data entry stage. Consequently, validation and verification have to be carried out immediately prior to the processing of each transaction. On-screen verification At the end of each transaction entry, the operator is given the opportunity to scan the data on the screen and to re-enter any incorrect entries detected. This usually takes the form of a message at the bottom of the screen, which is phrased in a way such as Verify (yes or no). On-screen validation Character, data item and record checks, such as range and mode checks, can be made each time the RETURN key is pressed during data entry. For example, the screen may prompt for the en-try of an account number, which must be 6 digits long and be within the range 000001 to 500000. Any entry which does not conform with these parameters is erased and the prompt re-displayed for another attempt. Appropriate screen dialogue to allow the data entry operator to enter into a conversation with the computer is a crucial part of the input design process and is dealt with as a separate topic in Chapter 21. Batch data entry The type of keyboard transcription used will be affected by the type of input data. Where, for example, files only need to be updated weekly, transaction data may be batched and entered onto magnetic disk for processing at a later stage in one update program run. System processes All the clerical and machine-assisted processes, which are necessary to achieve the desired output from the given inputs, need to be identified. This will allow the systems analyst to determine the role of the computer in the new system, the programs necessary to take over the processing stages and the changes needed to clerical procedures, before and after computer processing. There are many instances when the processing requires not only the input data but also data retrieved from files. For example, to generate a customer invoice requires: i. input data concerning commodity codes and quantities ordered; ii. data from the stock master file concerning prices of items ordered by reference to the input commodity codes; iii. customer details from the customer master file. The above processes can be completely computerised but other processes may require human intervention. For example, before a customer order is processed, the customers credit status may need to be checked and referred to a supervisor before authorisation. Non-standard procedures Most processes will follow standards suitable for their particular circumstancesIt is important, however, that the investigation identifies and notes any non-standard procedures. For example, what procedure is followed when there is an insufficient quantity of an ordered item to completely fulfil a customer order? It may be that some customers will take part-orders, whilst others require the full quantity of an item or none at all. If non-standard procedures are needed, it is important to know their complexity, how often they are used and what extra information is required. Ideally, a system should be designed to cope with all possible circumstances, but cost sometimes forces a compromise. Document flow System flowcharts can be used to model the movement and interaction of documents and the data they record, as well as the processes involved. In order that the involvement of each section, department or personnel grouping in the processes can be identified, the system flowchart is divided into columns representing these divisions of responsibility. A system flowchart may use a range of standard symbols, which are illustrated in Figures below. A number of standards exist for the drawing of system flowcharts and the range of symbols used depends on which stage of the investigation and design process has been reached. For example, in the early stages of investigation of an existing manual system, there will be no representation of computer methods of input, processing, output or storage. At a later stage, when computer methods are being considered, it will be necessary to use suitable symbols in the flowchart Flow Chart Symbols Figure illustrates example of a manually operated order processing and invoicing system. The Figure illustrates example of a batch processing stock file update of a stock master file. Notice the sorting and validation stages, which are essential to batch processing systems Most business systems require alternative actions to be taken dependent upon some variable condition or circumstance. For example, 15 per cent customer discount may be allowed if the invoiced amount is paid within, say, 14 days of the invoice date, after which time all discount is lost Batch Processing Stock File Update Of A Stock Master File. In order that computerised and non-computerised processes can be properly designed, the investigation must identify all: * decisions made during system operation; * conditions and circumstances which lead to alternative decisions; * actions to be taken following a decision. Figure represents the computerised aspects of a similar system, but does not show detail procedures needed to prepare, for example, the data for input or the distribution of output. A computerised system must have the necessary clerical procedures to support it. Some decisions and consequent actions will need to be documented for clerical procedure guidelines, whilst others which involve computer processing will form part of program specifications used in program writing or as bases for choice of packaged software. System outputs * output design first requires identification of the following: * data items required as output. Some may be revealed in the existing system, whilst others may be requested by users as being desirable in any new system; * form of the output, for example, whether or not printed copy is required; * volume of data with each output and the frequency of the output. This information assists decisions on the type and number of output devices required. On-line orderprocessing Based on the above information, the following tasks can be carried out: i. selection of an appropriate output device to display or communicate the outputs. ii. designing output screen and document layouts. System storage (files) The storage of historic and current information is a vital part of any business system. For example, to produce a payslip not only requires transient input data concerning hours worked and sickness days but also data on rate of pay, tax code, deductions of tax and superannuating to date etc., which are held in the payroll master file stored on magnetic disk. Information on the contents of files will be gathered from existing manual files, together with responses from users regarding the output requirements of any new system. If packaged software is to be used then the contents of files will be dictated by the package, in which case some data item types may be surplus to requirements, whilst others which are required may not be available. File contents Each file consists of a number of logical records, each of which has a number of associated data items. For example, each stock record in a stock master file may include: Stock Code; Description; Unit Price; Minimum Stock Level; Re-order Quantity; Quantity in Stock. File organisation and access This concerns the logical ordering of records within a file. Database management systems (DBMS) An increasingly popular alternative to traditional file processing systems is to construct databases controlled by a DBMS. The design process requires that data is analysed according to subject area, for example, raw materials or staffing, rather than by department or functional area. Choice of storage device Choice is concerned with storage capacity, mode and speed of access. Data Flow Diagrams Data Flow Diagrams are a widely used technique for representing the information flows of a system. They are a particular feature of SSADM methodology (Structured Systems Analysis and Design Method). They arc used in the early stages of a systems analysis to provide an understanding of the present system. As the project proceeds they are used to represent the required and also as a basis for program specification. DFDs can be drawn at various levels of detail. At the high Level the DFD is known as a Context Diagram which shows the system as one box with flows going to and coming from external entities. This can then be decomposed into more detailed DFDs. A DFD can show the physical processing of the present system detailing the departments and individuals concerned in the work, or it can be a logical DFD which shows what happens to the data rather than how the processing is carried out. A logical DFD is useful as it frees the analyst from being over influenced by the present system. Purpose of A Data flow diagram It is a diagrammatic representation of information flows within a system showing: * how information enters and leaves the system. * what changes the information. * where information is stored. A DFD is also useful to: * show the boundaries and scope of the system. * check the completeness of the analyses * ensure that all information flows and activities have been considered. * show the major functional areas of the system and therefore identify particular program requirements. DFDs can he used by both technical and non-technical staff and is used in discussions between the analyst and the user. One of the greatest strengths of DFDs is that they can be used to describe a system at several levels. Components of DFDs External Entity The source of information provided to the system. Or the recipient of information provided by the system. An oval shape represents it. If understanding of the DFD can be enhanced then an external entity may be drawn more than once. Process A process transforms or manipulates data within the system. It is represented by a box and will include a numeric identifier, the location of the process, and the process identifier. When naming processes begin with a verb and follow it by an object. e.g. Make Delivery, Receive payment. The object should always be singular. Data Store Data stores may be manual or computer files, and represent the place where a process places data so that it can be retrieved later. Each data store is labelled with the letter M for manual or D for computer and is given a number. Data Flow Represented by an arrow which should be labelled with the data that is being carried (never use a verb on a data flow). Boundary A boundary is sometimes drawn around a DFD to show the limits of what is being investigated. Levels of DFD Level 0 DFD (Context Diagram) Shows the entire system a single black box communicating with the external entities. Level 1 DFD An outline DFD using typically up to 12 process boxes. It shows: * system boundaries, * external entities * main system flows, * main system functions. * data stores. Level 2 and 3 DFD Successively more detailed DFDs showing up to 8 process boxes per DFD. Data Flow Diagrams How do you start? Case study Example Draw a Data flow diagram of the following scenario Data flow diagrams A manufacturing company has a strict health and safety policy. They have a small health and safety department, which maintains safety levels in the organisation. They require that employees report any problems to them if they discover faults within the organisation of a hazardous or potentially hazardous nature. Reports from employees are received in the Health and Safety department either by telephone, e-rnail or internal memo. This information is received by the health and safety administrator who logs the calls on his fault logging computer database. The computer database issues a unique problem number, which is given to the head of department of the employee highlighting the fault. The head of department is also provided with details of the nature of the problem. There are two health and safety inspectors employed by the organisation who investigate the problems when they occur. They are based in the health and safety department and are given the details of the problem and the fault number from the computer database by the administrator who logs the assignment of the task on the fault logging database. When the problem is investigated and therefore the task is completed the inspectors contact the administrator to advise them of the situation. The administrator advises the particular head of department that the necessary work has been carded out and the task is closed in the fault logging database. 1. Pick out relevant information and place in tabular form External entity Processes Data stores Data. flows employee report problem fault logging fault details head of dept collect problem ID No health and safety inspectors close problem Fault No assignment details Completed details Fault closed details Health and Safety Department Fault Reporting System 2. Context Diagram (no data stores) 3. Produce the Data Flow diagram Example 1 A purchasing department receives a purchase requisition from the stores. The requisition is checked, and an invalid requisition is returned to the stores for correction. An order is made out using a file of approved suppliers, and sent to the appropriate supplier. A copy order is filed. The requisition is filed. When the goods arc received the invoice is compared with the filed copy order and an invalid invoice is returned to the supplier. Valid invoices are passed to the accounts department for payment, and fulfilled orders are filed. Draw a Level 0 and level 1 DFD for the purchase requisition system. Example 2 When an invoice is received from a supplier, it is checked against a file of authorised purchases. If the invoice does not much an authorised purchase it is returned to the supplier with, a querying letter. If the invoice matches an authorised purchase, but is for an incorrect amount then it is returned to the supplier with a standard form. If the invoice reconciles, a payment authorisation is made out. A cheque is then sent to the supplier, and the invoice and the authorisation are filed. Draw a level 0 and Level 1 DFD for the system. Example 3 This case study is based on the video issue recording system of the Gentlepeoples Video Library Club (GVLC). GVLC specialises in obscure videos that are not readily available from other sources. GVLC lends only to members of the Video Society part of the exclusive and very desirable Gentlepeoples Club. Details of finance are outside the scope of the investigation. Any member of the club is automatically a member of the library. Club membership is for one year; a few new members are admitted on 1 January each year; new members are not admitted during the year. The library is set up along conventional lines, though members are not restricted as to the number of videos they may borrow at any one time. Videos are requested for return only if required by another member. Most active users of the library regularly change their videos. Two or three copies of popular titles are available. In order to borrow a video a member selects it takes it to the issue desk and gives the video and his club membership card to the librarian. The librarian takes the video ID card from the video sleeve and adds the membership number to the card. The librarian places the card in the loans file and the member leaves with the video. When a member returns a video. He or she presents the video to the librarian. The librarian finds the video card in the loans file and places the card in the video sleeve before returning the video to the library shelves. To reserve a video, which is on, can. A member asks the librarian and leaves their membership number. The Librarian finds a relevant video in the loans file and adds the members number on the reservation column on the video card. The librarian also makes a note of the member who has the video on loan and completes a return request card addressed to that member. The address is taken from the library copy of the club membership book. When the reserved video is returned the librarian puts the video under the counter and completes a Reservation Ready card addressed to the member who requested the reservation again taking the address from the membership book. Tine member requiring he video can then pick the video up from the librarian and have it issued in the usual manner. Members make many enquiries of the librarians: typical questions include is the video entitled Dziadek on loan? Which video did actress Anna Kucharski appear in? have we a video entitled Son of Arturo? Have we any videos on the subject Right Action? The librarians are able to answer these queries by inspecting the loans file the actor index the subject index and the title index. In addition to the above duties the librarians receive new videos from the social committee of the club. The selection ordering and payment for the videos is outside the scope of this investigation. On receipt of the new video the librarian has to make out a video card for insertion in the video sleeve and the relevant entries for the indexes. The librarians are also responsible for amending the library copy of the membership book with changes of address and at the end of the year far collecting the new membership bock from the Club Secretary. Answers Example 3 GLVC Video Library Context Diagram Level 1 DFD Activity 1 College Library 1. Zero Normal Form 0NF List Attributes Stud# Name Address TG Tutor Book# Title ISBN ReturnDate Identify Primary key and repeating attributes. Write out in 0NF using standard notation:- When an entity has has a Repeating Attribute (e.g book has several authors) The repeating attribute is shown with a line over it STUDENT(Stud#, Name, Address, TG, Tutor, Book#, Title, ISBN, ReturnDate) 2. First Normal Form -1NF Rule- An entity in First Normal Form must not contain any repeating attributes. Remove repeated attributes to form a new entity LOAN_BOOK. There are now 2 entities in 1NF:- STUDENT(Stud#, Name, Address, TG, Tutor,) LOAN_BOOK(Book#,Stud#, Title, ISBN, ReturnDate) (A composite key is required to uniquely identify each loan of a particular book) 3. Second Normal Form 2NF Rule An entity is in 2NF if it is 1NF and all non key attributes are fully functionally dependent on the whole of the primary key. ( 2NF applies to entities with composite keys, that is a primary key composed of two or more attibutes. An entity which is already in 1NF, with a single attribute primary key is automatically in at least 2NF) The STUDENT entity has a single attribute primary key and is therefore already in 2NF. The LOAN_BOOK entity has a composite primary key so we need to examine all the non-key attributes to ensure they are fully functionally dependent on the whole of the primary key. Non-key attribute Dependent on:- Title Book# ISBN Book# ReturnDate Book#, Stud# Therefore Title and ISBN need to be removed to form a new entity BOOK. Book# is included to provide a link. The tables in 2NF are now:- STUDENT(Stud#, Name, Address, TG, Tutor,) LOAN_BOOK(Book#,Stud#, ReturnDate) BOOK(Book#, Title, ISBN) 4. Third Normal Form 3NF Rule To be in 3NF an entity must be in 2 NF (and therefore in 1NF) and contain no non-key dependencies. Fields which are not part of the primary key must always depend on the primary key and not on anything else, such as another non key field. Consider the entity STUDENT, Name Address depend on the primary key but Tutor depends on the Tutor Group code TG and not on Stud#. They should therefore be removed to form a new entity, TUTOR. A copy of the code TG is left in the student table to form a link. STUDENT(Stud#, Name, Address, TG) TUTOR(TG, Tutor) Consider the entity LOAN_BOOK, return date is dependent on the primary key and therefore already in 3NF. Consider the entity BOOK, title is dependent on the ISBN and not on the Book#, this should be removed to create a new entity ISBN. A copy of ISBN is left in the BOOK entity to provide a link. BOOK(Book#, ISBN) ISBN(ISBN, Title) The final tables are:- STUDENT(Stud#, Name, Address, TG) TUTOR(TG, Tutor) LOAN_BOOK(Book#,Stud#, ReturnDate) BOOK(Book#, ISBN) ISBN(ISBN, Title) H. T. Harvey 6-Feb-03 1 of 18 Chapter 18

Friday, November 22, 2019

Definition and Examples of Title Case and Headline Style

Definition and Examples of Title Case and Headline Style Title case is one of the conventions used for capitalizing the words in a title, subtitle, heading, or headline: capitalize the first word, the last word, and all major words in between. Also known as  up style and headline style. Not all style guides agree on what distinguishes a major word from a minor word. See the guidelines below from the American Psychological Association (APA Style), The Chicago Manual of Style (Chicago Style), and the Modern Language Association (MLA Style). Examples and Observations Alexander and the Terrible, Horrible, No Good, Very Bad Day, by Judith Viorst and Ray Cruz(the title of a book in title case)A Matter of Concern: Kenneth Burke, Phishing, and the Rhetoric of National Insecurity by Kyle Jensen (Rhetoric Review, 2011)(the title of a journal article in title case)The Lover Tells of the Rose in His Heart by William Butler Yeats(the title of a poem in title case)Probing Link to Bin Laden, U.S. Tells Pakistan to Name Agents(a headline in title case from The New York Times)APA Style: Major Words in Titles and HeadingsCapitalize major words in titles of books and articles within the body of the paper. Conjunctions, articles, and short prepositions are not considered major words; however, capitalize all words of four letters or more. Capitalize all verbs (including linking verbs), nouns, adjectives, adverbs, and pronouns. When a capitalized word is a hyphenated compound, capitalize both words. Also, capitalize the first word after a colon or a dash in a title . . . .Exception: In titles of books and articles in reference lists, capitalize only the first word, the first word after a colon or em dash, and proper nouns. Do not capitalize the second word of a hyphenated compound.(Publication Manual of the American Psychological Association, 6th ed. American Psychological Association, 2010) Chicago Style: Principles of Headline-Style CapitalizationThe conventions of headline style are governed mainly by emphasis and grammar. The following rules, though occasionally arbitrary, are intended primarily to facilitate the consistent styling of titles mentioned or cited in text and notes:Capitalize the first and last words in titles and subtitles (but see rule 7), and capitalize all other major words (nouns, pronouns, verbs, adjectives, adverbs, and some conjunctionsbut see rule 4).Lowercase the articles the, a, and an.Lowercase prepositions, regardless of length, except when they are used adverbially or adjectivally (up in Look Up, down in Turn Down, on in The On Button, to in Come To, etc.) or when they compose part of a Latin expression used adjectivally or adverbially (De Facto, In Vitro, etc.).Lowercase the conjunctions and, but, for, or, and nor.Lowercase to not only as a preposition (rule 3) but also as part of an infinitive (to Run, to Hide, etc.), and lowercase as in any grammatical function.Lowercase the part of a proper name that would be lowercased in text, such as de or von.Lowercase the second part of a species name, such as fulvescens in Acipenser fulvescens, even if it is the last word in a title or subtitle.(The Chicago Manual of Style, 16th ed. The University  of Chicago Press, 2010) MLA Style: Titles of Works in the Research PaperThe rules for capitalizing titles are strict. In a title or subtitle, capitalize the first word, the last word, and all principal words, including those that follow hyphens in compound terms. Therefore, capitalize the following parts of speech:Nouns . . .Pronouns . . .Verbs . . .Adjectives . . .Adverbs . . .Subordinating conjunctionsDo not capitalize the following parts of speech when they fall in the middle of a title:Articles . . .Prepositions . . .Coordinating conjunctions . . .The to in infinitives . . .Use a colon and a space to separate a title from a subtitle, unless the title ends in a question mark or an exclamation point. Include other punctuation only if it is part of the title or subtitle.(MLA Handbook for Writers of Research Papers, 7th ed. The Modern Language Association of America, 2009)The difference between title case and every word in capitals is minor, and we think that very few of your users will notice. But Opt For Every Word In Capitals And A Few Of Your Users Will Find Themselves Mentally Correcting Every Wrongly Capitalized Word. Its a bit like the use of apostrophes: most people dont notice whether or not you are correct; some people definitely do and their irritation about your mistakes will distract them from the smooth flow of questions and answers.Our bottom line: opt for sentence case if you can.(Caroline Jarrett and Gerry Gaffney, Forms That Work: Designing Web Forms for Usability. Morgan Kaufmann, 2009)

Thursday, November 21, 2019

Process-Centered Management Essay Example | Topics and Well Written Essays - 2750 words

Process-Centered Management - Essay Example This kind of management is one where all activities leading towards the achievement of organizational goals, are process driven with a deep-rooted influence on the channelization of material and information along the way. This has been regarded as an emerging trend where work in progress is concerned owing to the fact that it provides observations of a revolution that's only just begun. The natural leaders are among the first to have taken to and moving already from a procedure-based culture towards a process-based culture; from micro to macro; from a microscopic view to a telescopic view. Procedure-based task analysis has now been very systematically replaced by process-related performance technology where it is now believed that the kinds of work that people do, the jobs they hold, the skills they need, the careers they follow, the roles managers play, the principles of strategy that enterprises follow will shift towards handling processes that they are most suited to. The shift ha s been carried forth from the revolution of ideas, in which the keyword is radical, to the organized reworking of a society in need, in which the keyword is processed. Apart from banking, process centered management has been extremely effective in the IT industry as well. It is in this context that the as an invisible economic asset, there are important opportunities that are inherent in the concept of process-centered management. This has been triggered by the paradigm shift discussed above, where the time spent in inventory cycle is more important than the size of inventory held. We will now regard the company we are studying in order to reach more understanding of core processes as well as the marcoms outcome and other projections. Marcoms may be defined as the tryst between communication and marketing, a proportionate combination of which is required to give sales that vital push.

Tuesday, November 19, 2019

Function of afterlife Essay Example | Topics and Well Written Essays - 250 words

Function of afterlife - Essay Example Written in the form of interviews conducted from the famous souls had already departed from the world, the author has given the message that the individuals leading a life in service of humanity in one way or the other would be in peace and under the blessings of the Lord in heavens. On the contrary, the persons, who had inflicted the pains and sufferings upon the fellow humans, are sure to undergo punishments in inferno in afterlife (31). As a result, the individuals including Shakespeare, Edison, Pasteur and others, would be blessed against their wonderful contributions carried out in the field of art, medicine, literature and others. Similarly, the despotic rulers, evil-minded politicians, pagans and purported dogmatists would have to undergo the wrath of Lord for their wickedness and misdeeds (48). Hence, if the individuals give up and forget believing in the messages and lessons manifestly mentioned in the Holy Scriptures that humans are not responsible to anyone after death, ev eryone will start inflicting harms, hurt and throbbing pains upon others (67). On the contrary, strong faith in God as well as His system, based upon justice, truth and benevolence, teaches the humans to be kind, sympathetic and compassionate towards others. Consequently, the author has conveyed the universal message of love and benevolence through his under-investigation work, which urges the readers to observe chastity, mercifulness and compassion towards one

Sunday, November 17, 2019

Marketing Management of Ocean Park Essay Example for Free

Marketing Management of Ocean Park Essay Brief Description of Ocean Park Hong Kong Ocean Park Hong Kong is one of the most popular theme parks in the world. It was officially opened on January 10th 1977 by the governor of Hong Kong and was funded by the Hong Kong Jockey Club on July 1st 1987, with a Government-appointed Board. It constitutes of marine mammal, oceanarium, animal and amusement as a theme park, located in Wong Chuk Hang and Nam Long Shan in the Southern District of Hong Kong. Reason for Choosing Ocean Park Hong Kong Ocean Park Hong Kong ruled the local amusement park landscape alone. In 2005, Hong Kong Disneyland had arrived and busted out the Park from its near 30-year comfort zone. However, Ocean Park has secured the prestigious 2012 Applause Award, which was the first in Asia to be rewarded. The reason for choosing Ocean Park Hong Kong is thus to study how effectively the marketing strategies are used in the Park against its main competitor, Hong Kong Disneyland. SWOT Analysis A Strength of Ocean Park Hong Kong is the numerous attractions with different levels of amusements ranging from roller coasters to aquariums. Another one is the five major annual events throughout the year: a varying Animal in High Definition Month, the Ocean Park Summer Splash, the Halloween Bash, Christmas and Chinese New Year celebrations. Yet, the most obvious weakness is the several incidents happened in the past five years. Panda attacking a feeder, dying of Chinese sturgeons and sudden pause of attractions – all these had surprised the public’s confidence to the park. In terms of opportunity, there is a proposed MTR station on the east of South Island Line for Ocean. Park Hong Kong. The station would help attract more customers for the Park because it will be easier and more convenient to visit. The major threat is from the future development plan of Hong Kong Disneyland, which is expected to build more themed areas, rides and hotels in the coming decade to match the increasing needs. There will be keen competition between Ocean Park Hong Kong and Disneyland after such an expansion. Marketing Objectives Since Ocean Park Hong Kong aims to become a leader among the theme park industry, its marketing objective is to strive for a place in the top ten of the total number of visitors of the Global Attractions Attendance report by AECOM within two years. Moreover, the Park hopes to increase its profit by at least 20% within two years due to the huge amount of visitors every year. Last, due to the accidents happened in recent years, customers’ satisfaction towards Ocean Park Hong Kong has been damaged. To increase customer retention and satisfaction, the Park should make an effort to ensure there will be no accident in the coming two years Reference list 1 / 2 Rubin, J. (2013). Global attendence attractions report. Retrieved from http://www. aecom. com/deploy edfiles/Internet/Capabilities/Economics/_documents/ThemeMuseumIndex_2013. pdf (2014). Vision and Mission. Retrieved from http://www. oceanpark. com. hk/html/en/footer/corporate-information/vision. html (2014). Annual Report. Retrieved from http://www. oceanpark. com. hk/doc/common/footer/ar/ophk_ar12-13. pdf Ocean Park, Hong Kong. (n.d. ). In Wikipedia. Retrieved October 7, 2014 from http://en. wikipedia. org/wiki/Ocean_Park_Hong_Kong Pelle, J. (2012). Liseberg The Applause Award. Retrieved October 5, 2014 from http://liseberg. com/en/home/Entertainment/Awards1/ Nip, A. (2014). Annual tourists to Hong Kong could rise to 70 million in three years, commission says,SCMP,17 January from http://www. scmp. com/news/hong-kong/article/1407779/visitor- numbers-can-rise-70m-three-years-commission-says? page=all POWERED BY TCPDF (WWW. TCPDF. ORG).

Thursday, November 14, 2019

Carbon Fiber :: essays research papers

Carbon fiber Carbon fibers are produced by using heat to chemically change rayon or acrylic fibers. Carbonization occurs at temperatures of 1000 ° C to 2500 ° C in an inert atmosphere. Carbon fibers are converted to graphite at temperatures above 2500 ° C. Carbon and graphite fibers can also be made from pitch, a residual petroleum product. Products that use carbon fibers include heat-shielding materials, aircraft fuselages and wings, spacecraft structures, and sports equipment. You can golf, ride, sail, tennis, drive, cycle, fish, decorate or even fly Carbon Fiber! Carbon fibers are derived from one of two precursor materials Pitch and Pan. Pitch is based carbon fibers have lower mechanical properties and are therefore rarely used in critical structural applications. Pan based carbon fibers are under continual development and are used in composites to make materials of great strength and lightness. The raw material of Pan, acrylonitrile, is a product of the chemical industry and can be manufactured as follows: Acrylonitrile is used as a raw material in acrylic fibers, ABS resin, AS resin, synthetic rubber, acrylamide and other materials. Global production capacity is 4.67 million tons, approximately 60% of which is consumed for acrylic fibers. In the early manufacturing processes acetylene and hydrogen cyanide were used as a raw material, whereas today nearly all AN is manufactured using what is called the Sohio process, whereby an ammoxidation reaction are applied from inexpensive propylene and ammonia. Technological advances, particularly surrounding research into improved catalysts for the   Ã‚  Ã‚  Ã‚  Ã‚  Sohio process, are proceeding, promoted by a concern for energy conservation and lessening the environmental loading. The research aims include improved productivity, reduced byproducts, and lesser wastewater and waste gas. The Sohio process was perfected in 1960 by The Standard Oil Co. of Ohio, owing to the development of an epoch-making catalyst that synthesizes AN in a single- stage reaction using propylene and ammonia. The reaction took place using the fluid-bed od. The P-Mo-Bi group is used as the catalyst and favorable fluidized conditions are maintained by adjusting the physical properties of the catalyst. The reaction gas contains not only AN, but also acetonitrile, hydrogen cyanide and other byproduct gasses, so AN products are obtained by having the reaction gas absorbed into water, then using evaporation separation. The Sohio process was epoch-making at the time it was developed, but improvements have been made in response to the following conditions: The AN yield of approximately 60% was not very high; The process circulated and used large amounts of water, requiring a lot of