Thursday, October 31, 2019

Tensile testing Lab Report Example | Topics and Well Written Essays - 500 words

Tensile testing - Lab Report Example Data from the test is either collected through a data acquisition system and subsequently plotted using appropriate software or plotted using an X-Y plotter. The data typically consists of the load applied to the specimen and the extension or the stress and strain (since the initial cross sectional area of the specimen and gauge length are constants both the load v extension and stress v strain graph have the same shape); a typical plot for a metallic material is shown in figure 2. Tensile specimens may have a variety of cross-sections, although rectangular or cylindrical ones tend to be more common, and may be in a machined or unmachined state. The geometry of a typical specimen is shown in Figure 3, where (note that the nomenclature may vary): The mechanical properties typically derived from a tensile test include the yield stress (or more commonly the offset proof stress), tensile strength (stress), elastic (or Young’s) modulus, percentage total extension at fracture and reduction in cross-sectional area. A more detailed explanation of the range of properties that may be determined from a test and the analysis involved may be found in BS EN ISO 6892-1:2009 and ASTM E8M. It is good practice to test to a standard such as these as they stipulate various parameters, such as the speed of testing (the rate at which the load is applied) and shape of the specimen, which may affect the results obtained, although some companies will have their own procedures that will ensure compatibility between tests within that company. Stress is usually indicated by the Greek letter ÏÆ' (sigma) or S and is the measure of the force per unit area. It has the units N.m-2 or Pa (Pascal) (megapascals, MPa, are more commonly used, these being 106 x N.m-2 (106 Pa) or N.mm-2, due to the magnitude of the values encountered). Strain is usually indicated by the Greek letter ÃŽ µ (epsilon) or e and is the amount a material

Tuesday, October 29, 2019

Accounting Essay Example | Topics and Well Written Essays - 1000 words - 3

Accounting - Essay Example A company that has low long term debt can abtain cheaper prices as far as interest rates from lenders. The disadvantage is that the company is leading idle potential opportunities to grow. c) A large cash balance allows a company to obtain interest revenue. A large cash fund gives a firm stability and reduces business risk. A disadvantege is the cost of opportunity of using that cash asset on some other projects that can generate a larger return on investment. 6. The change in methodoly from FIFO to average inventory created a price that is more realistic and better adjuted to market changes. The effects in the accounting books of such a change could be either an understatement or overstanment of the inventory total. 7. a) The mission of the FASB is to establish and improve standards of financial accounting and reporting for the guidance and education of the public including issuers, auditors, and users of financial information (Fasb, 2009). c) The procurement plan utilizes a framework of the following factors: pervasive of the issue, alternative solutionsk, technical feasability, practical consequence, covergence possibilities, cooperative opportunities, and

Sunday, October 27, 2019

The Benefits Of Initiating An Information System Information Technology Essay

The Benefits Of Initiating An Information System Information Technology Essay A business information system is a group of interrelated components that work collectively to carry out input, processing, output, storage and control actions in order to convert data into decision making and operational activities in an organisation Source: Business Information Systems, technology, development and management for the e-business. (p.43) The reasons behind an organisation usually initiating an Information System can be put down to a business opportunity or problem and or the strategic advantage over its rival businesses in order to grow and survive in a competitive environment. A key question for an organisations reasoning behind whether or not to initiate an information system is, what would be the consequence of not having the proposed information system? The benefits of initiating an information system are, Some benefits to consider when an organisation is thinking of initiating an Information System are the 5 Cs of Senn (1995) Cost reduction: This is often the main objective in the introduction of a new system. Capability: being capable of achieving something which was not possible before. Communication: try to improve internal and external communications with costumers and suppliers. Control: better information delivery on things like performance. Competitive advantage: having the edge in a competitive market is vital to staying ahead or keeping up with the industry. A feasibility study. Before any organisation initiates an information System they must carry out a feasibility study. This is to establish whether the business problem or opportunity can be solved by introducing the new system and to check that it benefits the overall business strategy. This may involve two separate steps. The first, establishing an overall feasibility report of a project, to establish the objectives and the needs for a new system. Once it is decided that the whole project is worthwhile then a more in depth evaluation will be carried out and a list of different solutions will be drawn up. There is a sequence of activities which is undertaking during the initiation phase of any information system project. Assessing feasibility is arguably the most important step of the initiation phase. This involves a cost-benefit analysis and the effect on the organisation from having the new information system. Defining the business objectives and outlining systems requirements. The need for critical success factors (CSF) is valuable to help align business objectives with the new system. Evaluating acquisition alternatives, this will go through different aspects such as performance, suitability and cost from different suppliers. Defining scope involves specific system boundaries by describing which part of the business will be affected by the new system. Defining responsibilities to allow time for the final users of the system and managers input must be set aside along with the system developers. Assessing the risk involved to identify any potential problems which may affect the project and cause it to fail and taking precautions against this. Identifying the constraints and developing the project plan is useful for the estimating and planning of the initial project plan. This will take into account the size and the complexity and establish a preliminary timescale and also budget. The basis for a good business. Information systems are the basis for a lot of businesses. Most industries rely on an up to date information system for survival and even existence. Without the use of Information Technology it would be inconceivable, because of its critical role in increasing productivity. In a lot of modern organisations, information systems make extensive use of information technology such as desktop computers and laptops. This is mostly down to the advantages which arise from the use of such systems. Advantages, Speed, being able to process millions of instructions each second and completing each task in a very short space of time is hugely beneficial to any company or organisation. Accuracy, a calculation which is carried out by a computer is most likely to be completely accurate and human error can be reduced or even eliminated altogether. Reliability, computer-based information systems can in theory have no down time and can operate 24 hours a day. Programmability, the ability to change or to modify the software to suit any given function provides a high degree of flexibility. Combining these advantages is majorly beneficial to any business; however there are still disadvantages to an organisation which relies heavily on a computer based information system. Disadvantages, Judgement or experience cannot be thought to a computer based information system. Flexibility or improvisation, a computer based information system would be unable to react to an out of order or unexpected event or situation. Innovation, the computers inability to think outside of the box and to discover new ways to help improving processes or even solving problems. Conclusion. Many of the reasons for initiating an information system are to increase productivity, improve order fulfilment, business or customer demand, legal requirement, update an old system, technological change, or gain strategic advantage or the competitive edge over other companies in the industry, however there are a lot of steps in which an organisation must go through to see whether or not the system will benefit the companys overall business strategy. Once all the right steps have been taken and every part of the process mapped out, the decision must be made, taking into consideration the advantages over the disadvantages if the plan is feasible or not or whether it makes good business sense?

Friday, October 25, 2019

Confucianism Essay -- Religion Religious Essays Papers

Confucianism   Ã‚  Ã‚  Ã‚  Ã‚  Confucianism is a system of thought based on the teachings of a Chinese man named Kung Fuzi. Which is latinaized as Confucius, he lived from 551 to 479 b.c.e. Confucius claimed that he was not original and neither were his teachings, but believed himself to be a â€Å"creative transmitter of wisdom from the past†. He created a moral code on based on ethics, humanity and love. Confucius philosophies emphasize the ideals of order and harmony. With the idea that people should live in harmony both with each other and with nature. To achieve this, Confucius created a system of human relationships and good government. Government to Confucius was the highest profession. He believed that if one had a good government everyone would be happy. In addition, Confucius esteemed education in high regards believing that through it, one could reach the high standard of a gentleman..   Ã‚  Ã‚  Ã‚  Ã‚  For a religion Confucianism is very different from any other. Due to the fact that the Chinese see religion as a form of education. The purpose of Confucianism was mainly to instill moral values in a person. There is no organized church or structure, no priests, no sects, and no creed for any follow. There is no worshipping or personal relationship with god but did recognize heaven as a force of human concern. Confucius did believe that men should direct their own destiny. Confucius taught that harmony begins in the family, which was a minuet of society. In which the man of...

Thursday, October 24, 2019

Hacktivism: The Anonymous Hackers. Essay

Hacktivism is the act of hacking, or breaking into a computer system, for a politically or socially motivated purpose. The anonymous hackers are part of the hacktivisim, it originated in 2003, however, in 2008 the group began to move toward political and social change. â€Å"We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us† (Brian 2012). The anonymous hacker group has presented itself in the street of different cities in the world after downloading a Youtube video asking all the anonymous for a meeting in the street, and starting their own community. â€Å"After WikiLeaks released hundreds of thousands of classified U.S. government documents in 2010, the ensuing cyber-attacks waged by all sides in the controversy brought the phenomenon of hacktivism into popular focus† (Noah 2012). After WikiLeaks many forms of hacktivism exploit illegal. The anonymous help in saving people life in Arab spring country. As in Egypt the anonymous team up tog ether from the US and Egypt to provide communication tools for Egyptian people after the Egyptian government starts shutting down the internet for the whole country (Brian 2012 Anonymous). The hacktivisim is used to search for freedom in Arab spring country from the dictatorial government. In Tunisia and Egypt, anonymous took down the government websites, and allowed people to enter the websites, and post their messages in the government consider it as freedom of speech as the websites own by the people not by the government (Kris 2011). Hacktivism most of the time is illegal act of getting secret information from our own government and publish it to the public. It looks for individual and group freedoms that may achieve with hacking (Shalin 2013). MasterCard, Visa, and PayPal also have been attacked by the anonymous hackers. A phone interview with anonymous in RT news about these hacking, the anonym said â€Å"that we did that for the movement of freedom of information speech† as the anonymous support WikiLeaks and the information that WikiLeaks provide, and these three company cut the fund to WikiLeaks. â€Å"On February 25 @AnonymousIRC, an Anonymous Twitter account with over 280,000 followers began posting â€Å"teasers† about a massive Bank of America data leak (Dell 2013)† the anonymous found 4.8 gigabyte of information about people career and salaries. The anonymous collective said â€Å"the data was actually retrieved from an open, insecure server in Tel Aviv, Israel, but also managed to obtain a full version of Clear Forest’s text analyzing software (Dave 2013)†, and at the end the anonymous left a message asking about these information and why it’s in the Israeli server. The anonymous isn’t about the good guy or the bad guy; it’s the character of the individual. One minute they are heroic and good in saving civilization. A few minutes later they are hacking, and doing unethical thing by hacking personal information and put them for the public, and steeling credit cards. â€Å"Anonymous was never anyone’s personal army, and never stayed on any one topic for very long (Quinn 2011).† The anonymous can be anything from anywhere, a child, a mother, a doctor, and a teacher anyone can be anonymous. The anonymous groups are people who have opinion, and they express their opinion with hacking corporation and government websites. They are looking for the freedom of speech and exchanging information among others without any limitation from the government that hide information from the people, and from the big corporations that they just look at the people as profit. The anonymous have been success of expressing their opinion in Arab spring country, and they were one of the biggest reasons in starting the revolution in those countries. The anonymous have been hacked many Israeli website to show the world the unethical act that the Israeli government does against the Palestinian people in Gaza. Hacktivism is expressing a lot of people opinion that they can’t say because they are scared of the government, and it is going to play major role in the future, like it’s right now or more. As the technology will get wider the hacktivism will get bigger. The anonymous might continue with same name or with different name, as long as, people looking for the truth and freedom hacktivism will stay around and grow. The Anonymous is a group of people from all over the world doing illegal acts, but most of the time they are showing the bad activity that government big corporation does to the people. And is hard for any government to follow them and a rest them, because they are anonymous and anyone can be one of them. Works Sites Anonymous Internet Users Team Up To Provide Communication Tools For Egyptian People (2011 January 29). http://www.huffingtonpost.com/2011/01/29/anonymous-internet-egypt_n_815889.ht ml Brian Knappenberger. (2013 February 26) Anonymous/4Chan/LulzSec/Hacktivism – Full Documentary. http://www.youtube.com/watch?v=4MYl1CbW5jY Dave Smith (2013 February 28). Bank of America Hacked By Anonymous: Hackers Leak ‘Secrets’ About Executives, Salaries, And Spy Activities. http://www.ibtimes.com/ Dell Cameron (2013 February). ANONYMOUS HACKED BANK OF AMERICA AND SEEMINGLY REVEALED THAT THEY ARE SPYING ON HACKTIVISTS. http://www.vice.com/read/anonymous-hacked-bank-of-america Kris Notaro (2011 March 9). From Tunisia and Egypt to Wisconsin: Anonymous Hacker Group Helps Take Down Insupportable Websites. http://ieet.org/index.php/IEET/more/notaro20110309 Noah C.N. (2012 July 1). HACKTIVISM: A NEW BREED OF PROTEST IN A NETWORKED WORLD. Boston College International & Comparative Law.

Wednesday, October 23, 2019

Kant on Milgram’s Perils of Obedience

Stanley Milgram conducted a study through a laboratory set-up to evaluate the perils of obedience of different subjects and participants of the study. One of significant results of his study entails that ordinary people, his participants, actively performs his or her job without any hostility and regard in their participation on something wrong done. (Milgram, 1974). To some evaluated participants, the case describes their disobedience with the standards of morality given the provision of a governing or instructing authority. Participants who were made to do wrong at some point, would derive satisfaction from the wrongness by knowing that they obeyed the authority commanding their actions. Milgram mentions that obedience can be defined as the ability of an individual to disassociate his responsibility on the wrong act because he only granted his authority’s wishes (Milgram, 1974). Moreover, a subordinate would feel shame or pride depending on how he has followed an authority’s instructions. The reality this reflects in the society maintains that loyalty, duty and discipline are significantly strained with the emotional and obedience conflicts. A subordinate’s defined role is does not necessarily instill his morale, but rather socially construct his role based on the social provisions, including defiance of his role in the perspective of his authority. Obedience in some cases also reflects a defense for people to do wrong things, as explained in the article, many participants who became the teacher in the set-up, punished the learner because they were following the instructions of the experimenter, and assured of no responsibility with the learner. People heeds to authority without discerning their own stance or the consequences of their actions. Based on Kant’s model of society, all disobedience from the supreme legislative power, or the authority and law, is considered as the greatest and most punishable crime of mankind because it inhibits the very foundations of society. Kant’s position on obedience does not allow the challenge of authority, and rejects the right of revolution or rebellion. (Williams, 1983) The evidence is shown through the study conducted by Milgram. Kant strictly attributed authority with the same governing laws and constitution of a society, thus disallowing any form of disobedience. Realized through Milgram’s article is the conflict which arises from following the authority with personal moral issues within an individual. Kant’s philosophy on this maintains the duty of all individual to hope for both moral and positive law to be achieved. (Williams, 1983) Kant defined obedience as a requirement of pure reason from individuals and makes them coerce with the law of an authority, while maintaining their freedom within and among their fellows. (Williams, 1983) The system of an authority demands strict adherence from the subjects of the state, because that makes individuals be the subject of authority. However, Kant subjects a restriction to an individual to resist conflict of the morality of one’s own, with his adherence to the authority. The arguments resolved by Milgram on his study entails how individuals refer to their morality with obedience to authority. Evidently, emotions and moral issues comes in conflict with being submissive to authority, but in the end, people act even in contrast with their emotion because the pride and satisfaction of doing what can be considered as wrong, comes from following the directives of the authority.