Monday, September 30, 2019

Delhi Police Achievement

DATED 09/01/2013 PRESS RELEASE  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   CENTRAL DISTRICT GANG OF INTERSTATE CHEATS INVOLVED IN INTERNET BANKING FRAUD BUSTED : FOUR ARRESTED With the arrest of (1) Ajay Kumar Mishra, aged about 45 years s/o Parmeshwar Mishra r/o WZ-823, Palam, Village, Delhi, permanent address Add:- VPO& PS- Jainagar, Madhubani (Bihar), (2) Binay Kumar, aged about 35 years s/o Harish Chand r/o A-166, Devali road, Khanpur, Delhi,  Ã‚  Ã‚  Ã‚  Ã‚   permanent address VPO- Kaitpwar, PS –Sakatpur, Darbhanga (Bihar), (3) Ravi Shankar Pandey, aged about 45 years r/o A-63, near Rama Public School, New Gopal Nagar Extn.Najafgarh, Delhi and (4) Jitender Kumar, aged about 40 years s/o S. R. Suman r/o 38/11, A Block, Amrit Vihar, Burari, Delhi, Central Distric t has busted a cheating racket which had cheated several businessmen by cracking the passwords of their bank Accounts and subsequently transferring huge amounts through internet transactions and RTGS transfer in various Accounts and by subsequently withdrawing the amount from these accounts located in different parts of the country. INCIDENT On 03-01-13, one Sh.Ravi Gupta, owner of a Metal Firm having his office in the area of P. S. Pahar Ganj gave a complaint that Rs. fifteen lakhs have been transferred from his Account illegally through Electronic Transferring System. On this, a case vide FIR No. 02/13 u/s 420 IPC was registered at P. S. Pahar Ganj and the investigation was taken up. TEAM A team comprising of Inspr. Suresh Kaushik, SHO/Pahar Ganj, SI Vinay Kumar, SI Dharmender Kumar, HC Satpal and Ct. Chand Ram was constituted under the supervision of Sh.Anil Kapoor, ACP/Pahar Ganj   /Central Districts to apprehend the culprits. INVESTIGATION During the course of investigation, it was revealed that the money had been transferred from the account of the complainant to different Accounts of Delhi, Lucknow and Agra. It was further revealed that Rs. seven lakhs had already been withdrawn from ICICI Bank Green Park Branch where a total of Rs. ten lakhs were transferred. Sources were deployed to apprehend the accused persons as   it was suspected that they would approach the bank to withdraw the remaining amount.On 04-01-2013, on the basis of secret information, accused Jitender Kumar and Binay Kumar Mishra were apprehended by the police team from ICICI Bank Green Park Branch, Delhi when they were trying to withdraw the remaining amount cheated from the account of accused Jitender Kumar. During the interrogation, it was revealed that the accused are the members of an interstate gang, who were operating in Delhi. The accused persons used to take instructions from their accomplices namely Ajay Mishra and Ravi Shanker Pandey.It was further revealed that accused J itender Kumar and Binay Kumar Mishra were assigned the task to arrange for operational Accounts of different persons in different Banks all over India from where money could be transferred and the same could be withdrawn immediately even before the victim came to know about the illegal transaction from his Account. At the instance of accused Jitender Kumar and Binay Kumar Mishra, accused Ajay Kumar and Ravi Shanker Pandey were apprehended by the police team from Dwarka and Najafgarh respectively. Ajay Kumar and Ravi Shanker Pandey are the operational members of the gang.At the instance of accused Jitender Kumar and Binay Kumar Mishra, Rs. 30,000/- cash has been recovered and the Bank Account where cheated money more than Rs. four lakhs had been deposited has been frozen. Further investigation / interrogation is in progress. MODUS OPERANDI The members of the gang have thorough knowledge and understanding of Internet Banking. They used to hack the computers of different companies havi ng their current Accounts in Multi National Banks. Once they used to get the user name and password of Account through hacking, they used to track the major transaction of the victim.As soon as the accused persons used to have a substantial amount in that Account, they used to approach the service provider of the Mobile Company of the victim to get a duplicate SIM so that the victim may not get the ALERTS from the Banks of those particular transactions. The members of the gang then used the user name and password of the Account to get the money transferred to a particular Account and thereafter other members of the gang used to start working and withdrew the money through cheque, through ATM or would transfer the money in different Account in different parts of the country.The accused persons used to siphon off money only from the Accounts in Multi National Banks as the transfer and withdrawal was comparatively fast in these Banks. RECOVERIES †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã ‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Rs. 30,000/- Cash and Rs. Four lakhs has been frozen in the Bank Accounts. †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Mobile phones used in the operation. PROFILE 1. Ajay Kumar Mishra s/o Parmeshwar Mishra r/o WZ-823, Palam, Village, Delhi, Prem Add:- VPO& PS- Jainagar, Madhubani, Bihar is 45 years old and has studied up to B. Sc. (Pass) from LLMU, Darbhanga, Bihar.He came to Delhi in the year 1993 and joined a private company as an Accountant but claimed himself to be a CA. At present, he runs an office at Sector 6, Dwarka, Delhi providing Accounts Services and import / export consultancy. 2. Binay Kumar s/o Harish Chand r/o A-166, Devali road, Khanpur, Delhi, permanent address VPO- Kaitpwar, PS –Sakatpur, Darbhanga (Bihar) is 35 years old and has studied up to   B. A. and had worked as Account Assistant in different private companies. At present, he runs a Security Agency and HR Consultancy from his residence. 3.Ravi Shankar Pandey r/o A-63, near Rama Public School, New Gopal Nagar Extn. Najafgarh, Delhi is 45 years old and has studied up to class 10th. He is in the business of printing. 4. Jitender Kumar s/o S. R. Suman r/o 38/11, A Block, Amrit Vihar, Burari, Delhi is 40 years and has studied up to B. A. He works as Accounts Assistant in various companies. (DEVESH CHANDRA SRIVASTVA), IPS ADDL. COMMISSIONER OF POLICE, CENTRAL DISTRICT, DELHI. [pic]PRESS RELEASE | | | |[pic] | [pic][pic] |SOUTH WEST DISTT. | | |   | Dated: 09/01/2013 BLIND GRUESOME MURDER CASE WORKED OUT IN NO TIME. TWO ARRESTED. MOBILE PHONE OF DECEASED, WEAPON OF OFFENCE I. E KNIFE & MOTORCYCLE USED IN COMMISSION OF CRIME RECOVERED | | | |Highlights:- | | |†¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Gruesome blind murder case of a Delhi Jal Board driver solved. | | |†¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Deceased developed obsession towards accused’s young daughter, which led to his murder . | |†¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Two persons arrested | | |†¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Weapon of offence i. e. knife recovered. | | |†¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Mobile phone, shoes of the deceased and three broken sim cards have been recovered. | | |†¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Motorcycle used in commission of crime has also been recovered. | | |   | | | | | |   |With the arrest of two accused persons viz (1) Lady and (2)Rakesh (aged-24yrs) `s/o Nathhu Lal r/o Village Khajuri, Delhi, PS Bindapur, South-West District Police has worked out a case of brutal murder, which occurred on the evening of 06/01/2013 in the area of Mohan Garden, Uttam Nagar. Weapon of offence i. e. knife, mobile phone and shoes of the deceased, and motorcycle used in commission of crime have been recovered. GIST OF CASE On 06/01/13 a PCR call was received vide DD No. 60B at 10. 34 PM at PS Bindapur regarding an unclaimed suitcase lying in D- Block, Phase-I, J J Colony, Dwarka Sec- 3. I. O.S I Ashok Kumar along with staff reached at the spot where foul smell was emanating from the Suitcase which was wrapped in a quilt. Finding the matter suspicious SHO/Bindapur and crime team were called at the spot and opened the suitcase in which a male dead body aged about 30-35 years was found bundled. On inspection throat was found slit with a sharp edge weapon and a polythene was found tied around the neck. The corpse was shown to the number of passerby and neighbourers but despite best efforts the identity of the dead body couldn’t be established. Bereft of any alternative a case of murder vide FIR No. 0/13 u/s 302/201 IPC PS Bindapur was registered on DD No. 60B and investigation was taken up in right earnest. BREAKTHROUGH At the outset, to establish the identity of the deceased was the challenge before the police. Message in the context of details and descriptions of unknown dead body was flashed. Crack teams were formed and were dispatched to the adjacent Police Station s. During this exercise, a team led by SI Ashok came to know that a person is missing from the area of Mohan Garden, Uttam Nagar. The information was further developed and photograph of the deceased was shown to the family members i. . elder brother of deceased. Finally the hard work bore fruits and the identity of the deceased was established as Inder s/o Rajvir Singh r/o L- 2/C- 49, Mohan Garden, Uttam Nagar. After establishing the identity of the deceased, Police launched a massive manhunt to trace the culprits. Local enquiries were made by the Police to extract clues about the last seen of the deceased. Sensing the gravity of the case a special team comprising Inspr. Rajvir Singh Lamba SHO/Bindapur, Inspr. Subhash Chand Inspr. /Investigation Bindapur, SI Ashok Kumar, H. Ct. Rohtash, Ct. Dinesh under the supervision of Sh.M. S Dabas, ACP/Dabri was constituted. The team had   a detailed investigation plan and started to pursue the available leads. The team did survey the areas a djoining the scence of crime at about the same time the following night to simulate and recreate the incident. During this exercise, the police team managed to unearth some vital clues. It was transpired that the deceased had illicit relation with one lady. The team got retrieved and analysed the CDR of the deceased and suspect lady. The analyses depicted that the deceased and lady had frequents talks on the mobile.Accordingly, the lady was interrogated by two different teams at length, who was resiling from her version each time, who also deposed that she had cordial relation with the deceased and is no more concerned with the death of Inder,   however the same version was contradicted by the various circumstances collected by the police. It turned out that deceased had frequent visits in her house, which resulted in developing relations with her. Of late, the deceased also started having an evil eye on her young daughter, which was the bone of contention. The deceased was warned by the lady and even a quarrel ensued between the duo.Police did lot of ground work in this context. As the probe intensified and the matter was minutely and deeply focused, prima-facie it appeared that the lady (friend of deceased) is dodging Police and was actively involved in the murder of Inder. Reversing back step by step it transpired that on the evening of 06/01/13, Inder was in the house of the lady. Above circumstantial evidences pointed the needle of suspicion towards her and her two associates. Her contradictory statements were exposed and finally she broke down. She confessed to have murdered her friend and packed his body in a suitcase which was dumped in he area of J J Colony, Phase- I, Dwarka, Sec-3. INTERROGATION & CONFESSION Accused lady was subjected to sustained interrogation, who revealed that Inder(deceased) was her friend. He had frequent visits in her house. Of late, he became obsessed with her daughter   for which Inder   was warned but he did not mend h is way. All means/sources were exhausted by her to save the dignity of her daughter but the deceased did not mend his ways, thus she decided to eliminate him. She took the help of her brother Rakesh Kumar and his associate (friend of Rakesh). As per plan, Inder was called at her house.Tea was offered, which was laced with sleeping pills. When Inder became stupor, she brought knife from kitchen and gave to Rakesh. She caught hold of hands of Inder andhis associate sat on the legs of Inder. Rakesh slit the throat with the knife. After confirming the death of Inder, they bundled the body and wrapped it   in a gunny bag, Thereafter it was stuffed in a suitcase. The suitcase was further wrapped in a quilt and same was dumped in the area of J J Colony, Phase- I, Dwarka Sec- 3. Accused lady was produced before the concerned court and her one day PC remand was taken.On her pointing out, accused namely Rakesh has been apprehended. Material evidences i. e. shoes of deceased, mobile phone of deceased and three broken sim cards of deceased, motorcycle used in commission of crime, weapon of offence i. e. knife have also been recovered at the instance of duo. NAME AND PROFILE OF ACCUSED PERSONS ACCUSED NO. 1   Ã‚  Ã‚  Ã‚     lady Accused is an illiterate and a house wife. She has three children. Her husband is a causal painter. Deceased helped the accused financially on several occasions. Deceased got the advantage of the same and developed physical relation with the accused.To this extend accused tolerated everything but could not digest the matter when deceased showed interest towards her young daughter. First she warned the deceased when he did not mend his way. He was murdered as per plan. Further startling facts emerged that accused arranged the weapon of offence i. e. Knife, called the deceased at her resident, offered tea by adding intoxicants ACCUSED NO. 2 Name  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   -Rak esh Father’s Name  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   – Nathhu Lal Address  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   – Village- Khajuri , Bhajanpura, Delhi. Age  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   -24yrsEducation  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   -illiterate Present job  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   -Private job Family status   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   -poor Accused is an illiterate. He is unmarried and originally hails from Rajasthan and has rental accommodation in Village Khajuri. RECOVERY -Weapons of offence i. e. knife. -Mobile phone of deceased and three broken sim cards. -Shoes of deceased. -Motorcycle used in commission of crime. Further investigation is in progress and staff involved in this good work is being suitably rewarded. (ANIL KUMAR OJHA) IPS     Ã‚   ADDL. COMMISSIONER OF POLICE SOUTH-WEST DISTT. NEW DELHI Dated 09. 01. 13 MAID SERVANT WITH PARAMOUR ARRESTED – STOLEN MONEY RS. 4 LAKHS RECOVERED The staff of Police Station Janak Puri has nabbed a maid servant namely Nomee D/o Late Oklu Tete R/o Village Mokhra, Post Office Ponikele, PS Gumla Distt. Gumla Jharkhand with her boy friend namely Santosh Kumar Sahu S/o Sh. Harihar Prashad Sahu R/o Village Katia, Post Office Jeetu Toli, PS Bano, Distt. Seendega Jharkhand. With the arrest of this maid and her boy friend, a case of servant theft registered vide FIR No. 06/13, U/s 381/34 IPC PS Janak Puri has been worked out and stolen amount Rs.Four Lacs has been recovered. PROFILES OF THE ACCUSED 1. Nomee D/o L ate Oklu Tete was born in Village Mokhra, Post Office Ponikele, PS Gumla Distt. Gumla Jharkhand, age 20 years. She studied up to 5th class and due to poverty, she could not continue her study and came to Ghaziabad UP and worked there as a Maid around 1 ? years and thereafter worked as a Maid Surya Nagar and Gurgoan. Now for the last three weeks she was working at C-3/239 Janak Puri. 2. Santosh Kumar Sahu S/o Sh. Harihar Prashad Sahu was born in Village Katia, Post Office Jeetu Toli, PS Bano, Distt.Seendega Jharkhand age 26 years. He could not persue his further studies so came to Delhi. He worked in a placement agency at Tilak Nagar and also worked as a cook servant in the area of Nariana and Tilak Nagar. Now he is working in the SLG Placement Agency Berri Wala Bagh Hari Nagar Delhi. RECOVERY Stolen Rs 4 Lacs recovered. INCIDENT On 07. 01. 13 complainant Dr. Ajay Gupta R/O C-3/239 Janak Puri made a PCR Call that his maid servant is missing and on 08. 01. 13 he has reported that amou nt of Rs. four Lacs has been stolen from his house and it might be stolen by his absconding maid.Dr. Ajay Gupta had not got the servant verification done from Police. TEAM On the direction of ACP/Vikas Puri Sh. Prakash Chander Mann and under the leadership of Insp. H. S. P. Singh, SHO/ Janakpuri, a team comprising of SI Karambir Singh, HC Bijender, Ct. Harjinder Singh, Ct Yoginder, and W/Ct Rakhi was constituted. Information was developed and it was found from the SLG Placement Agency situated at Beri Wala Bagh Hari Nagar, through whom the maid was employed that she had intimacy with one Santosh Kumar Sahu working in the SLG Placement agency.Raid was conducted at the residence of Santosh Kumar Sahu S/o Harhar Prashad at RZ-209, Gali No. 10, West Sagarpur Delhi and both were apprehended. INTERROGATION  Ã‚  Ã‚  Ã‚  Ã‚   During sustained interrogation they admitted their guilt. Sahu could not proceed further studies so came in Delhi. He worked in a placement agency at Tilak Nagar and also worked as a cook in Nariana and Tilak Nagar. Now he is working with the SLG Placement Agency Berri Wala Bagh Hari Nagar Delhi where he came in contact of Nomee. Gradually he became friend of Nomee and both fell in love and wanted to get married.To accomplish their goals, they made a plan to steal the huge amount of money so that they can get married and settle down. Staff involved in good work is being rewarded suitably. (V. Renganathan) IPS Addl. Commissioner of Police,   Ã‚  Ã‚  Ã‚   West District, New Delhi. [pic] NORTH- WEST DISTT. DATED 9, JAN. 2013 PRESS RELEASE AUTO-LIFTER ARRESTED With the arrest of one auto-lifter namely Ravi @ Kala on 8. 1. 13, the Anti Auto Theft Squad of North-West District has recovered one stolen vehicle. (1)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Ravi @ Kala s/o Dilbagh Singh R/o H. No. 436/31 Gali No. 2 New   Court Road Ashok Vihar Sonipat Haryana.Age-28 yrs. INCIDENT: On 8. 1. 13, a secret information was received in AATS/North West District that one per son would come on a stolen Scorpio near M2K Mall (NSP) Subhash Place to dispose off the same. On this information, a team of A. A. T. S. comprising of the officials mention below laid a trap near M2K Mall(NSP) Subhash Place and apprehended one youth with one Scorpio bearing No. DL-3CAA 4511 Silver Colour. Later on, the youth was identified as Ravi @ Kala s/o Dilbagh Singh R/o H. No. 436/31 Gali No. 2, New   Court Road, Ashok Vihar, Sonipat, Haryana (aged 28 years).He was asked to produce the papers of the said vehicle which he could not produce. The engine and chassis numbers of the said vehicle were verified from AUTO MATCH and ZIP NET, and it was found that the said vehicle is stolen vide FIR No. 293/12 dated 17. 11. 12 u/s 379 IPC PS Nangloi, Delhi. Subsequently he was arrested vide   DD No. 45-A dated 8. 1. 2013 u/s 41. 1(d)/102 Cr. P. C PS Subhash Place, Delhi INTERROGATION: On sustained interrogation, accused [email  protected] Kala revealed that   he used to steal veh icles from different parts of Delhi with his associates Sikander and Amir both resident of   Distt.Mujaffarnagar,   UP. On further interrogation, the accused   [email  protected] Kala disclosed that   he has also stolen one Tata Safari with his associates Sikander and Amir from Anand Vihar Delhi which was left abandoned   in Sonipat, Haryana when police picket tried to stop them . TEAM: A special team was constituted under the close supervision of ACP/Operations North-West Distt . Sh . Aas Mohd. with the following officers. 1. Insp. Satya   Pal  Ã‚  Ã‚   No. D-I/599  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   I/C   AATS. 2. SI Sukram Pal No. D-1498 3. HC Naresh Kumar   No. 642/NW  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   4. HC Surender Kumar   No. 581/NW 5. HC   Pawan Kr. No. 23/NW  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚   6. HC   Krishan Pal No. 1361/NW 7. Ct  Ã‚   Jagdish No. 879/NW  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚   8. Ct. Shohan lal Tyagi,   No. 1898/NW 9. Ct Mahesh Kumar No. 512/NW 10. Ct. Raman Kumar No. 2058/NW 11. Ct. Vikash Kr. No. 1333/NW RECOVERY One stolen Scorpio No. DL 3CAA 4511 CASES WORKED OUT (1)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   FIR No. 293/12 dated 17. 11. 12 u/s 379 IPC PS Nangloi, Delhi   Ã‚  Ã‚  Ã‚   (2)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   FIR No. 331/12 dated 21. 11. 12 u/s 379 IPC PS Anand Vihar, Delhi PROFILE OF ACCUSED PERSONS Accused Ravi @ Kala has studied upto 10th class from Haryana and belongs to a lower middle class family.His father is a farmer. He has one previous criminal record. Accused Ravi @ Kala came in contact of Sikander and Amir(both resident of Uttar Pradesh) and started stealing   the   Ã‚  vehicles for quick money. The concerned Police Stations have been informed about his involvements/arrest. Sincere efforts are being made to arrest his associates. (M. A RIZVI)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   DY. COMMISSIONER OF POLICE,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚   NORTH-WEST DISTT. ,DELHI. Dated: 09. 01. 013   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   South-East District police in association with Justice Sunanda Bhandare Foundation is organizing a Gender Sensitization programme for police officers of the district on 10. 01. 2013 at Conference Hall, South-East District, PS Sarita Vihar from 1100 Hrs onwards. The programme aims at giving insights to the police officers into gender relations and strengthening their professional approach with effective policing of city public spaces thro ugh swift and sensitive response to crime especially against women. Addl. Commissioner of Police South-East District, New Delhi.

Sunday, September 29, 2019

Like a Virgin Essay

Note: Some names have been changed to protect the anonymity of the persons involved. Fake nose, fake lips, fake bust†¦ Can anything stay natural these days? Surgeons have apparently achieved to change every part of the body and they ain’t going to stop. Indeed, another form of surgery has become widespread around the world: hymenoplasty. Morocco hasn’t escape from that trend. But why in the world a woman would want to have her hymen −the tissue that covers the external part of the vagina and is broken in the first sexual intercourse− back? According to Dr. Youssef Derouich, a general practioner at a health center in Marrakech, hymenoplasty is â€Å"the reconstitution of the hymen using an artificial tissue or using the mucous membrane to create in this case an endogenous hymen.† There is another type of hymenoplasty: hymenorraphy which is simply a temporary hymenoplasty. Dr. Derouich emphasized the fact that it is an expensive surgery that is not allowed by the Moroccan law −which is why it is done secretly in some private hospitals. The hymen of a hymenoplasty lasts until the sexual act, while the one resulting from a hymenorraphy lasts for about two weeks as Dr. Derouich explained. There’s more. Women have another option, less expensive but more risky, to simulate their virginity. A made in China gadget. It is basically a little plastic bag full of fake blood that explodes during the defilement. A trick worthy of the best illusionists. Originally, it was a sex-toy made by a Japanese company. Read more:  Essay About the Virgin by Kerima Polotan Years after, a smart Chinese company, Gigimo, took this concept and started making cheap artificial hymens and selling them in Arab countries. We can now find these gadgets in some souks in Casablanca or Rabat for less than 300 dirhams (Roucaute). If Moroccan women are using those two methods these days to recreate a second virginity, despite the allergies, infections, and sutures’ failure that it may cause as Dr. Derouich asserted, it is mainly because of the importance of virginity of a woman in Morocco. â€Å"What a shame it would be for a man to marry a non-virgin woman!† Ms. Nadia Azzouzi, an active member of L’Association Dà ©mocratique des Femmes du Maroc (The Democratic Association of Women of Morocco) affirmed. The new bride even risks to be rejected by her family and divorced from her husband. These methods prove Ms. Azzouzi again the absurdity and hypocrisy of the Moroccan mentality. The first reason that she points out is that the non-virgins use it to pretend to be pure and chaste during their wedding night. Especially when in some areas in Morocco, we still have that tradition called the â€Å"bridal sheet† where the groom has to show to his family and sometimes even to the guests waiting in front of the door, the traces of bleeding caused by the defilement of his wife. An artificial hymen will be a â€Å"life-safer† for the non-virgin in this case, erasing her â€Å"mistakes of the past† and making her accepted by her family-in-law. Recreating a hymen is â€Å"lying to her husband while the principal foundations of marriage are trust and mutual respect. But most of all, it is lying to herself because imagining that she can restore a factitious virginity with a small piece of flesh is burying her head in the sand, like if it was this membrane that determines the chastity or even the value of a woman,† says Ms. Azzouzi. However, she is aware that in some cases, hymenoplasty is â€Å"acceptable† like for the examples that Dr. Derouich gave: little girls that had an accident when biking or riding a horse, or the 20% of women who don’t even have a hymen. Ms. Azzouzi’s voice became high-pitched when she started talking about the consequences of this behavior and how it drives in the male domination in the society. â€Å"Approving this is letting those men, who run after girls in bars and night clubs, exert their machismo on women that have to be docile and innocent and don’t own the right to have a sexual freedom.† She also adds that men do not want their wives to be already â€Å"used.† They find in this â€Å"privilege,† a way to prove their virility and impose, from the beginning, their strength in the couple. It will consequently lead to the objectification of the woman and drag her to the level of an object that becomes â€Å"useless once touched.† â€Å"The concept of virginity can’t be changed overnight,† says Nadia Azzouzi with a sigh. â€Å"We can maybe see hymenoplasty as a step forward to the freedom of women, but we can’t fool ourselves. A hymen can’t be sewed on again. Do we really want to own our rights with this petty and deceitful way? No! This method goes against all what sex equality stands for. It will only deepen the gap between the two genders and kick start the male chauvinism in our country.† And who knows, maybe two or three generations later, nobody will give that much importance to virginity anymore. Works Cited Azzouzi, N. Telephone interview. 9 Feb. 2013. Derouich, Y. Telephone interview. 10 Feb. 2013.  « L’hymà ©noplastie, une seconde virginità ©.  » Le Monde. Le Monde, 06 Jul. 2012. Web. 8 Feb. 2013. URL: http://www.lemonde.fr/societe/article/2012/07/06/l-hymenoplastie-une- seconde-virginite_1729088_3224.html

Saturday, September 28, 2019

Language Personal Statement Example | Topics and Well Written Essays - 500 words

Language - Personal Statement Example Even in my country, there is only one of my peers that curses and my friends and I have alienated him. I am a tremendous believer that first impressions mean everything. I am not a fan of profanity. I do realize that some people have awful moments and at some times have even heard a profane comment well placed. While I may find the circumstances understandable, I myself do not curse at all. As a result, I found that this assignment was rather simple. I did notice though that so many people employ profane words as part of their basic English. I find the practice in general to be offensive and also to be a sure sign of ignorance. One can walk a city street anywhere and hear phrases peppered with the "F-bomb" and what not. For example "I need cash but I can't find a F------ ATM machine". I go about my daily business without having to caution myself in cursing thus this assignment was not one that I found to be challenging. I did note however, that I was intensely alert to those cursing around me. I wonder what would happen if people actually listened to themselves speak. We have a moment, and only a fleeting one after that first impression, to alter it. After one looks at us, they hear us speak. We usually use our voices to deliver a message to others. That message can be taken as true or false.

Friday, September 27, 2019

Is there such a thing as genuine emotion Discuss with reference to the Essay - 1

Is there such a thing as genuine emotion Discuss with reference to the concept of emotional labour in the workplace - Essay Example Many CEOs believed that emotions would get in the way of managers being able to make good decisions (Grandey, 2000). Research has shown however, that emotions can be a very positive aspect of the workplace and can be used to meet organizational goals. In his play, â€Å"As You Like It,† Shakespeare wrote, â€Å"All the world’s a stage and all the men and women merely players †¦Ã¢â‚¬  (Shakespeare, 2003). If this is true, then each of us is an emotional actor who plays various roles upon the state of home, work and the community. At home with family and friends, we act one way and with friends we act in a different way. In the workplace, most people have a totally different persona because they want to do their best and they may feel that emotions make them vulnerable. The challenge is that the average person cannot leave who they are totally at home; they will bring some of who they are to the workplace and this includes their emotions. According to Grandey (2000) emotional labor can involve â€Å"enhancing, faking or suppressing emotions to modify the emotional expression† (p. 95). Emotional labor has display rules that decide how emotions are to be expressed inside the organization. The rules may be told in some way to employees through training materials or they may be learned by observing other co-workers. There may be specific emotions that must be used in specific situations in organizations. As an example, anyone working in customer service will need to smile and be friendly to customers in order to keep customers happy. This is one example of how emotions come into an organization and can be used successfully. There are many theories about emotional labor in the workplace. The first theory began with Hochschild in 1983. Hochschild is a sociologist and saw emotional labor as â€Å"the management of feeling to create a publicly observable facial and bodily display† (Grandey, 2000, p. 96). He observed this from the perspective of the

Thursday, September 26, 2019

Financial services Essay Example | Topics and Well Written Essays - 1250 words

Financial services - Essay Example Transactions on derivative contracts occur between two parties in which a financial agreement is done whose payments depend on the value of the underlying assets and securities. Derivative contracts are broadly categorized into lock and option products. Lock category derivative contracts bind the two parties into an obligation of executing the contract according to the terms and conditions over the period for which the contract is agreed upon. Option product derivatives are contracts that provide the right to the buyer but not the obligation to execute the contract over the period of the contract (Whaley, 2007, p.121). The derivative contract includes an agreed upon price between the two parties to buy or sell the product within a specified period of time. The derivative contracts may be traded in the exchange in which case these are called exchange-traded-derivatives or may be privately traded in which case these are called Over-the-counter derivatives. Over the counter derivatives are not traded in specialized exchanges. Recent examples of banks and companies making heavy losses from using derivatives The financial meltdown of 2007 in US was largely due to the fall in the mortgage prices which served as underlying assets for loan products. Irresponsible lending, relaxed policies of the banks, corporate houses and happy-go-lucky attitude of the regulators in assessments of the derivative products led to the fall of big banks like Lehmann Brothers. After a meagre financial recovery from the support of the government, derivative market is again one of the biggest markets in today’s global financial scenario (Schwartz and  Smith, 1997, p.499). Banks today are carrying out transactions on derivative markets on a much larger scale than ever before. The banks are more opaque and are indifferent to the risky derivative products. Banks, however, are unwilling to disclose the face of the derivative contracts to their investors. It is understood that a change i n the underlying market factors would lead to massive losses of the world economy as a result of devaluation of the underlying assets. The size of the derivative markets has grown from $500 trillion in 2007 to $707 trillion in 2011. Lack of transparency in trading of derivative contracts reflect the risk involved as a result of probable fluctuation of underlying market factors. This can be observed in the light of recent examples. J P Morgan has registered a loss of $6 billion due to trading in risky derivatives. The increasing size of derivative markets and declining due diligence in investments in order to achieve higher profits imposes higher risk. Several high ranked officials from big companies like Meryl Lynch, Morgan Stanley, and Citigroup commented that the banking industry is vulnerable in the wake of huge losses in derivative markets. After the earthquake in Japan, J P Morgan decided to reverse their position in derivatives due to the huge losses to be incurred. In 2011, D eutsche Bank decided to reduce the foreign currency exposure of Post bank by â‚ ¬8.1 billion looking at the heavy losses in their investment in derivatives. Deutsche bank themselves lost $1.74 billion in US derivative markets. A huge foreign exchange option for Hewlett Packard was executed early in order to reduce the losses predicted out of market uncertainty. Due to lack of transparency on the investments in derivative ma

Wednesday, September 25, 2019

EEOC REPORT KJ Assignment Example | Topics and Well Written Essays - 250 words

EEOC REPORT KJ - Assignment Example I also learned that the employers need to evaluate all the work conditions and circumstances in order to assess and determine specific remarks or conducts that are unwelcome by different religions. The topic, religious harassment, is important for my career in that I now understand the best practices that must be employed by both employees and employers in the workplace. Through the topic, I now understand what is expected of employers and employees in protecting freedom of religion. The topic, religious harassment, is related my business courses due to the nature of the business world. The world has become a global village, and people from diversified backgrounds meet and interacts to conduct business. Therefore, it is necessary to understand religious issues, especially what constitute religious harassment in workplaces. In conclusion, I chose the topic because of its sensitive nature in the workplace and the growing diversity in business organizations. I learned what constitutes religious harassments, responsibilities of both employers and employees, and liability limits in both

Tuesday, September 24, 2019

Lysistrata by Aristophanes Essay Example | Topics and Well Written Essays - 750 words

Lysistrata by Aristophanes - Essay Example Lysistrata then decides to summon all women and ask them to turn down any sexual requests from their husbands until the men decide to end the war. The heated conversation between the Commissioner and Lysistrata only highlights Lysistrata's sensibility. The women's power is further emphasized when they manage to scare away the Commissioner's police officers. Attempting to convince the Commissioner that war has cost women dearly and that a city should not be run with abrupt violence, Lysistrata uses an analogy of wool spinning-a common activity for women. The play approaches its reconciliation when the kings of Sparta and Athens both have an erection but are unable to have sex with their wives. The play then ends on a comic note with every man having an erection and desiring Lysistrata's naked maid while Lysistrata lectures them and has them sign the peace treaty. Although women in Lysistrata are able to influence war in Greence, they can only rely on their feminine sexuality and their husband's sexual desire to achieve such a political goal. In other words, on one hand Lysistrata wants women to assert their autonomy; on the other hand she exploits their sexuality. Thus, Lysistrata's only means to challenge men's authority is by using women as sexual objects. Lysistrata may be seen as a feminine figure as she arouses solidarity among women and takes the initiative to challenge the gender status quo in the country. On the surface, Lysistrata defies against the stereotypes of women set by men: domestic, docile, and obedience. However, by asking the women to refuse sex with their husbands to achieve the political goal, Lysistrata is in fact encouraging women to view their sexuality as a mere instrument, or a tool for them to achieve status quo with their husbands. Lysistrata displays her tendency to objectify women, just like their husbands do. For example, she gazes at Lampito and makes her feel like "a heifer come fair time." Lysistrata also scrutinizes Ismenia's vagina and the buttocks of the Korinthian Girl. Ironically, Lysistrata is examining the bodies of women as if she is a man while her goal is to define the gender inequality in Greece. While exploiting other women's sexuality, Lysistrata denies her femininity and she may be the most masculine character in the play. Lysistrata instructs the women to play on male stereotypes, that is, men have boundless sexual desire, while becoming more masculine herself. The only way Lysistrata can gain and retain her power is by rejecting not only the frailty, but also the femininity of women. In other words, Lysistrata can only empower herself as a woman by not acting like one. This complicates the argument that Lysistrata is a feminist play. According to the historical context of Ancient Greece, all characters in the play will be played by male actors in front of male audiences. This will inevitably affect the sexual tension of the play. In this particular context, the play may be viewed as a piece of male-oriented instead of feminist work as it allows the male audience to mock the "empowerment" of women with the overall comical tone of the play. The fact that there are no real women on stage and that Lysistrata is a masculine character suggests that Aristophanes does not intend to make the play an advocacy for female political autonomy. Ultimately, it is the men who have the power to change the

Monday, September 23, 2019

Domestic Jurisdiction Essay Example | Topics and Well Written Essays - 5000 words

Domestic Jurisdiction - Essay Example The concept of domestic jurisdiction in relation to freedom from intervention is very basically shown in the unit of society we call family. Before we became citizens of a country, we became parts of a state or a city. Before we became parts of any city, we are first members of a community, and before we became members of a community, we are primarily members of our own families. This is where the dynamic process of protecting one owns freedom and autonomy begins. As a family, we want to function on our own to the best of our abilities with minor help from other people. This is our responsibility to our unit. We want to deal with problems and seek out solutions with each other's help, before we ask assistance from other people. We try to keep family matters inside the home and away from the prying eyes of other families. We do not welcome intervention from other people in family matters without them being requested by us to do so. This action is not appreciated and even shunned as in trusion does not only violate privacy but it goes beyond the unwritten rule of familial boundaries where each family as a distinct unit of society has its own internal rules which the members abide to. These internal rules, however free the family members are in terms of acting on their own will, should be in accordance with the established general laws of the community. Intervention in family matters by other community members is justifiable if the laws of the community are not adhered to and if a certain member of the family is forced to act out of his own volition. This is also where law enforcement may intervene. The same is true for communities. Communities have their own specific agenda and priorities. It is because of the distinct agenda that a community is very wary of intervention from other communities. Resources are limited in communities so intervention is most likely to occur as a means to help or assist. It may also be mutually beneficial to both parties concerned. Going to a higher level or a wider scope, cities or states have the same characteristics. They may belong to one government and one country, but cities or states have their own set of rules aside from the general laws of the land. They have differing strategies and techniques to promote growth within their reach. They want to handle their own problems and issues first before transferring them to a higher authority. They want to exercise their autonomy the best possible way they can, before submitting to the authority of the government. Of course, every action that they do should be within the general laws of the land. The moment that laws are broken and disregarded, intervention from government will always occur. The principles discussed are all parts of the concept of domestic jurisdiction. They are the minor aspects and the foundation for the general idea of the term. In a larger setting, which is the global arena, the basic unit is the nation. A nation has its own members, its own rules, its own ways or techniques of doing things, its own resources and its own beliefs and values. All the factors comprising one nation may be slightly or very different from another. This degree of diversity makes each nation distinct from each

Sunday, September 22, 2019

Direct marketing. An advertising campaign Essay

Direct marketing. An advertising campaign - Essay Example Direct marketing is perceived by many customers as an undesirable way of marketing products. Direct marketing includes techniques such as telephone sales and unsolicited emails. When companies rely on these techniques their credibility as a firm is downgraded. There are other forms of legit direct marketing techniques that have been used by marketers for years to generate revenues. Some of these good direct marketing techniques include catalogs, leaflets, brochures, and coupons. A company that has been very successful globally using a direct marketing approach to sell its products is Amway. Interactive marketing involves having contact with the customer in order to obtain a reaction and feedback from them. The tool that is utilized the most in the 21st century in the application of interactive marketing is the internet. Social websites such as Facebook provide great interactive mechanisms that can be used by marketers to communicate with the customers. A website that revolutionized t he way people watch programming is Hulu.com. Hulu offers television programs in its website free of charge. The programming has very short commercial breaks. During these commercials many advertisers used interactive marketing by providing short one question questionnaires. 7. Samir - participation I like your response but you failed to mention a direct marketing method that is often by companies which is direct telephone sales calls. This method of marketing is very outdated and his perceived in a negative connotation by the customers of today. Nobody likes being pressure into buying a consumer product they don’t want or need. I think that the government should regulate telemarketers to avoid the invasion of privacy these sales phone calls represent. Most of these companies are obtaining their sales leads number using unethical practices. I think that interactive marketing has a lot of potential for companies doing business the US marketplace as well as abroad. 8. Kelly â₠¬â€œ participation Convenience is one of the attributes customers look for the most in their shopping experience. A company that has revolutionized the supermarket industries is Sainsbury’s. This UK firm has a service that allows shoppers to purchase their groceries through the website. The online order is subsequently delivered to the person’s home. This service saves shoppers a lot of time and it saves them money in commuting expenses. At $4 a gallon customers have to save gasoline any way they can. Other companies such as Walgreens are achieving interactive marketing by offering special offers that can only be redeemed online. For example when the customer completes an online survey at the corporate website they are eligible for coupon savings. DQ1 An advertising campaign that was very successful due to its ingenuity, creativity, and ability to captivate the minds of the viewers was the Geico ads. Geico has been running a series of ads using the Gecko character in o rder to transmit a Geico’s slogan, â€Å"15 minutes could save you 15% or more on car insurance.† The ads are very funny due to the Gecko character. The Gecko has become such a sensation that Geico created an autobiography online video story of the Gecko on its corporate website. This is all great stuff. I believe that this character is the reason Geico has become such a successful auto insurance company. Prior to the start of the Gecko series of commercials Geico was not a household name in the minds of American consumers. An ad campaign that lacks a marketing message due to its simplicity is Corona’s beer advertisements. These commercials consist of a man and woman in the beach in lawn chair, the actors done move while stuff occurs around them at the admiration of the Corona beer. The commercial are poor because they do not send a clear marketing message and they are not emphasizing any of the attributes of the product such as quality, flavor, and price. The c ommercial seem like a low budget project in comparison with the spectacular commercials its competitor

Saturday, September 21, 2019

Evaluate the Causes of World War I Essay Example for Free

Evaluate the Causes of World War I Essay World war one is one of the most important events in world history. It took place in Europe in 1914-1918. The whole world participated this war. So everyone had some responsibility. There are more than one reasons for the outbreak of this war. Mainly, it was the expansion form of nationalism the alliances system. Other issues played a major part too, such as imperialism, the industrial revolution, naval race and domestic factors. One of the main long term causes as I said before is Nationalism. Nationalism is the patriotic feeling when people believe passionately for their countries. The extreme feeling of nationalism is called ethnocentrism and it leads to fascism. Nationalism also, promoted the war because nationalists wanted to reestablish their nation’s power. Th e majority of people before and during the world war one, wanted to have a larger territory. Flags are created to represent a country. The three countries that formed the Triple Alliance was formed by different ethnic groups. Above all, Austria’s – Hungary’s ethnic groups wanted their independence. These groups were, Slovaks, Serbs Czechs. They wanted to rule themselves and have their own state. Particularly, many Serbs in different territories wanted to join the neighboring state of Serbia. Italy was also formed from a collection of smaller states, aiming at having its government established. The trigger cause of world war one was the assassination of Archduke Franz Ferdinard his wife also by a Serbian nationalist. This happened in June 1914 while they were in Sarajevo, Bosnia which was a part of Austria – Hungary. This assassination was in protest to Austria – Hungary having control of the region. This was the extreme form of nationalism as I said above, that killed the prince of Austria and world war one began. Another cause which cause the war is imperialism. In other words, the competition among powerful countries to extend their power. All the countries were looking for ways to conquer oversea colonies. There was a competitive feeling about it. They also needed more resources. Naval bases for Germany Britain were also of paramount important. For example, France Russia prepared to face any German invasion. Germany took from France an important industrial area of Alsace – Lorraine. In 1890 Germany has a New Kaiser who was very active. Germany seized control of Chinese ports wanted more oversea colonies as Britain France had. Italy also wanted more oversea colonies and that’s a reason it joined the Triple Alliance. Furthermore, there is another cause, the alliances. Alliances existed to support â€Å"friends† and threaten enemies. The promoted their own culture. Alliance’s movements are like gangs. They used violence and technology weapons. Alliances active role before the war was to understand the progress of the war country’s movements. So before world war one Russia defended Serbia. Serbia’s territories were controlled by the state of Austria – Hungary. Serbia started the war against Austria – Hungary and Russia got involved. France Russia had a close friendship. A response to get back its land Germany attacked France through Belgium. In 1884 the Triple Alliance we formed with Germany, Italy and Austria – Hungary to support each other militarily in case of an attack. The Triple Entente that formed in 1904 with Britain, France and Russia. The last cause of the war was the industrial revolution, in other words militarism. Militarism is associated with technology weapons. Such as cars, bombs, machine guns, submarines, bullets, dynamites etc. Industrial development was very important in order to be powerful. In this new war armies used cars and not horses. Another point is the radio, was used for propaganda. Everything was moving very fast. Military includes submarines, airplanes and machine guns. France Russia worried a lot for Germany’s development. Loans from France helped Russia to develop industries. Germany’s navy plan named â€Å"Navy Code† was increasing their navy. This plan worked as a threaten to Britain. Germany’s development of their navy was apparent. It become one of the world’s most powerful navy in 1980 with Britain first. In 1914 German industries was second in the world only to that of the USA. Serbia was also becoming a powerful force in Balkans. France also built up their industries army. Russia was the largest of all six powers however it was the most backward and least developed. As a result of this war there was devastation across Europe. Eight millions of people died twenty – nine millions injured. The use of the word destruction includes issues we are not able to see. It’s not only the destruction of buildings, the lack of education and the economic decline. It’s also the lack of ideas, family issues, the psychology of the crowd, propaganda and much more. Even after the world war one for decades the leaders changing politics, changes public opinions. In my opinion preserving the peace was neither Triple Alliance’s or Triple entente’s priority. What if the countries did not show off or compete for power? I believe that nationalism was the most important cause for causing the war. Consequently all the countries were reacting in extremely nationalistic ways and unreasonably. I also think world war one was a result of leader’s antagonism towards other countries which was sustained by the increasing nationalism of European nations. The assassination of Archduke worked as the immediate cause that triggered a domino effect of reactions among all these countries. If this wouldn’t happen, they would have find another cause to start the war. I suppose everything’s happened because of the selfishness leader’s had. They didn’t inspire the crowd this prove that there was the failure of diplomacy.

Friday, September 20, 2019

Business decision making in different ways

Business decision making in different ways 1.0 Introduction This project is not only done for the sake of submitting as we are asked to but also to gain knowledge by a lot of means in both practical and theoretical ways. Text books and study guides cannot give complete knowledge to any student. And I believe that the assignments are given for students to gain extra practical knowledge from the wide world around. In the study of business decision making us mainly focus on the knowledge of different methods of data analyses and how it is useful for business contest and then the presentation of data in an appropriate way to make decisions and predictions. Its purpose is to build better understanding of different business issues and the ways to tackle them. This project report is under the wide range of business decision making of an organization. We have discussed representative measures and measures of dispersions and the difference between them and how they are used to interpret information in a useful manner. After that we use graphs to prese nt the data in order to make them easy then using the graphs I draw some conclusion for business purposes. Finally we have given some solutions for a company which is encountering problems in telecommunications and inventory control. I have discussed the usefulness of intranet in the process of inventory control to overcome from poor inventory management. Also I have provided some solutions by comparing two proposals using DCF and IRR techniques and clearly mention which proposal the company should adopt in order to enhance its inventory control capacity effectively. This report helped me to apply the theoretical knowledge into real world examples and evaluate the advantages and disadvantages and make business decisions. 2.1Collecting and maintaining the medical data and Medical Records. In modern clinics and hospitals, and in many public health departments, data in each of these categories can be found in the records of individuals who have received services there, but not all the data are in the same file. Administrative and economic data are usually in separate files from clinical data; both are linked by personal identifying information. Behavioural information, such as the fact that an individual did not obtain prescribed medication or fails to keep appointments can be extracted by linking facts in a clinical record with the records of medications dispensed and/or appointments kept. Records in hospitals and clinics are mostly computer-processed and stored, so it is technically feasible to extract and analyze the relevant information, for instance, occupation, diagnosis, and method of payment for the service that was provided, or behavioural information. Such analyses are often conducted for routine or for research purposes, although there are some ethical constr aints to protect the privacy and preserve the confidentiality of individuals. Primary sources- Primary data sources are where YOU yourself have collected the data and it is not someone elses. For example a questionnaire created by you and handed out to the specific people, is a primary source. You can then use them to prove a certain hypothesis and explain a situation. Statistics, Surveys, Opinion polls, Scientific data, Transcripts Records of organizations and government agencies Secondary data- Secondary data are indispensable for most organizational research. Secondary data refer to information gathered by someone other than the researcher conducting the current study. Books Periodicals government publications of economic indicators, Census data, Statistical abstracts, Data bases, The media, annual reports of companies, Case studies Other archival records. 2.2 Data collection methodology and Questionnaire Records of Births and Deaths Vital records (certifications of births and deaths) are similarly computer-stored and can be analyzed in many ways. Collection of data for birth and death certificates relies on the fact that recording of both births and deaths is a legal obligation—and individuals have powerful reasons, including financial incentives such as collection of insurance benefits, for completing all the formal procedures for certification of these vital events. The paper records that individuals require for various purposes are collected and collated in regional and national offices, such as the U.S. National Center for Health Statistics, and published in monthly bulletins and annual reports. Birth certificates record details such as full name, birthdate, names and ages of parents, birthplace, and birthweight. These items of information can be used to construct a unique sequence of numbers and alphabet letters to identify each individual with a high degree of precision. Death certificates contain a great deal of valuable information: name at birth as well as at death, age, sex, place of birth as well as death, and cause of death. The personal identifying information can be used to link the death certificate to other health records. The reliability of death certificate data varies according to the cause and place: Deaths in hospitals have usually been preceded by a sufficient opportunity for investigations to yield a reliable diagnosis, but deaths at home may be associated with illnesses that have not been investigated, so they may have only patchy and incomplete old medical records or the family doctors working diagnosis, which may be no more than an educated guess. Deaths in other places, such as on the street or at work, are usually investigated by a coroner or medical examiner, so the information is reasonably reliable. Other vital records, for example, marriages and divorces and dissolution of marriages, have less direct utility for health purposes but do shed some light on aspects of social health. Health Surveys Unlike births and deaths, health surveys are experienced by only a sample of the people; but if it is a statistically representative sample, inferences about findings can be generalized with some confidence. Survey data may be collected by asking questions either in an oral interview or over the telephone, or by giving the respondents a written questionnaire and collecting their answers. The survey data are collated, checked, edited for consistency, processed and analyzed generally by means of a package computer program. A very wide variety of data can be collected this way, covering details such as past medical events, personal habits, family history, occupation, income, social status, family and other support networks, and so on. In the U.S. National Health and Nutrition Surveys, physical examinations, such as blood pressure measurement, and laboratory tests, such as blood chemistry and counts, are carried out on a subsample. Records of medical examinations on school children, military recruits, or applicants for employment in many industries are potentially another useful source of data, but these records tend to be scattered over many different sites and it is logistically difficult to collect and collate them centrally. Health Research Data The depth, range, and scope of data collected in health is diverse and complex, so it cannot be considered in detail here. Research on fields as diverse as biochemistry, psychology, genetics, and sports physiology have usefully illuminated aspects of population health, but the problem of central collection and collation and of making valid generalizations reduces the usefulness of most data from health-related research for the purpose of delineating aspects of national health. Unobtrusive Data Sources and Methods of Collection Unobtrusive methods and indirect methods can be a rich source of information from which it is sometimes possible to make important inferences about the health of the population or samples thereof. Economic statistics such as sales of tobacco and alcohol reveal national consumption patterns; counting cigarette butts in school playgrounds under collected conditions is an unobtrusive way to get a very rough measure of cigarette consumption by school children. Calls to the police to settle domestic disturbances provide a rough measure of the prevalence of family violence. Traffic crashes involving police reports and/or insurance claims reveal much about aspects of risk-taking behavior, for example, the dangerous practice of using cell phones while driving. These are among many examples of unobtrusive data sources, offered merely to illustrate the potential value of this approach. The questionnaire contains something in each of the following categories: Personal identifying data: name, age (birth date), sex, and so on. Socio-demographic data: sex, age, occupation, place of residence. Clinical data: medical history, investigations, diagnoses, treatment regimens. Administrative data: referrals, sites of care. Economic data: insurance coverage, method of payment. Behavioral data: adherence to the recommended regimen (or otherwise). 3.0 Data Analysis Representative Values. These are also called as measures of location or measures of central tendency. They indicate the canter or most typical value of a data set lies. This includes three important measures: mean, median and mode. Mean and median can be only applied for quantitative data, but mode can be used with either quantitative or qualitative data. Mean This is the most commonly used measure which is the average of a data set. This is the sum of the observations divided by the number of observations. Advantages of mean-objective: Easy to calculate Easy to understand Calculated from all the data. Disadvantages-affected by-outlying values May be some distance from most values. Median Median of a data set is the number that divides the bottom 50% of the data from the top 50%. Advantages- Easy to understand Give a value that actually occurred Not being affected by outlying values. Disadvantages- Does not consider all the data Can be used only with cardinal data. Not easy to use in other analyses. Mode Mode of a data set is the number that occur frequently (more than one) Advantages- Being an actual value Not affected by outlying value Disadvantages- Can be more than one mode or none Does not consider all the data Cannot be used in further analyses. Comparison of mean, median and mode For this garage, its representative values are as follows, Mean- 335 Median- 323 Mode- 430 As we can see mean and median does not vary drastically, but mode on the other hand varies. Here the owner has to select which price he has to charge among all these. Mode is very high and it doesnt consider all the values, so if the owner charge  £430 it will be expensive and the customers may switch to competitors. Therefore, owner should not choose mode. Now the selection is between mean and median. Both of them look reasonable and close to most of the cost in October. Median is usually preferred when the data set have more extreme observations. Unless it is likely to select mean because it considers all the data. From the overview of the cost in October it doesnt have extreme values at all. So the mean value wouldnt have affected much. Therefore it is advisable that the owner chooses the mean value of  £335 Measures of Dispersion Representative measures only indicate the location of a set of data and two data sets can have same mean, median and mode. In that case we cannot make any decision using representative values. To describe the difference we use a descriptive measure that indicates the amount of variation which is known as measures of dispersion or measures of spread. This includes the following measurements: Range-Range is simply the difference between the highest value and the lowest value. It is easy to calculate and understand, but it only consider the largest and smallest value and ignore all the other values and it is highly affected by extreme values. Quartile range- Quartile range is the difference between 3rd quartile and 1st quartile. It is also easy to calculate, but it does not consider all the values in a data set so it is not a good indicator. Variance and Standard Deviation- Variance measures how far the observations are from the mean. This is more important statistics because it considers all the observations and is used for further analysis. Standard deviation is the square root of variance. Both variance and standard deviation provide useful information for decision making and making comparisons. From the calculation range is  £284 and quartile range is  £170, but because of the defects of them we cannot use them to derive further decisions. Variance is 8426.9 and standard deviation is 91.79. From the figures we can see observations are highly deviated from the mean. Variance and Standard deviations are used to compare two data sets. So the owner of this garage can compare these two figures with a similar garage or the cost of November and make decisions such as select the price which has smaller variance and standard deviation. Quartiles and percentiles also like representative measure. They indicate the percentage of value below a certain value i.e. 3rd quartile indicate 75% of the observations are below a certain amount and 25% of observations are above. Quartiles and percentile values of the garage Quartiles- 1 248.5 2 322.5 3 418.5 Percentiles- 75% 418.5 50% 322.5 60% 349.4 From the above figures we can see only 25% of the values are above  £418 so we shouldnt charge a price above than that if we do so we will lose many of their customers. 25% of the observations are above  £248.5 so we have to select a price between  £248 and  £ 418. Earlier we have found out the mean which is  £335. This is between 2nd quartile and 60% of percentile. So from the use of quartile and percentile we can select  £335 as the service price. Thus quartile and percentile help us in decision making. Correlation coefficient measures the strength of the linear relationship between two variables. It is denoted by â€Å"r†. Value of â€Å"r† always lie between -1 and +1. If â€Å"r† is closer to +1, two variables have strong positive relationship. Correlation and coefficient also helps to make business decisions. 4.0 Presentation of Information Tables are good at presenting a lot of information, but it can still be difficult to identify the underlying patterns. Therefore the uses of charts and graphs play an important part in data presentation in an effective way. Graphical method includes scatter graph, bar charts, line charts, pie charts and histograms. Pie charts They are simple diagrams that give a summary of categorical data. Each slice of a circle represents one category. Pie charts are very simple and can make an impact but they show only very small amounts of data. When there is more data it becomes complicated and confusing. But using pie charts we can make comparisons. Here we can see the amount of commission Trevor plc paid is increasing because year 2008 has big proportion in the circle then 2007,2006 and 2005.so we can expect the amount will be higher than 2008 for the next year. Bar Charts Like pie charts, bar charts show the number of observations in different categories. Each category is represented by separate bar and the length of the bar is proportionate to the number of observations. Contrast to pie chart, more amounts of data can be plotted in bar charts. It is easy to make comparisons in different periods with different observations. Here sales of BMW and Mercedes are increasing continuously but sales of other cars fluctuating. Also we can see over all turn over also increasing year by year. Line Chart This is also another way of data presenting. Here we use line rather than using bar or circles. It is easy to draw line chart and easy to understand the underlying trend and make predictions. Area chart also like line chart but it shows the whole amount and shows each category as area. By using area chart we can understand the trend and also make comparisons. Line chart of Trevor plc indicates except Lexus, sales of other cars are increasing. But Mercedes show a dramatic increase from 2006 to 2008. During the period between 2005 and 2006 car sales tend to be steady. From the out come of this line chart Trevor plc mainly focus on BMW and Mercedes to increase its turn over in the forth coming years. Area chart also indicates the same result that line chart shows. Scatter Diagram and the trend line Scatter diagram drawn using two variables. Here we draw commission against year. Commission is plot in the â€Å"y† axis and year in the â€Å"x† axis. Scatter diagram explain the relationship between two variables whether they are positively or negatively correlated and whether they are strong or weak. Commission has a positive relationship with year for Trevor plc and the relationship is strong because most of the observation lies closer to straight line. We have calculated the correlation coefficient between commission and year and it comes 0.9744 this indicates strong positive relationship. Trend lines used to understand the underlying trend and make useful forecasting. The trend line of Trevor plc shows upward trend among commission and year. We can predict the commission would be approximately  £18000 in 2009 and it would be  £18500- £19000 in year 2009. 6.0 Intranet To: The Board of Directors From: Management Consultant Date: 20.12.2009 Subject: Intranet and its evaluation Intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. And also to share information within the branches of the same organisation. Advantages: Easy access to internal and external information Improves communication Increases collaboration and coordination Supports links with customers and partners Can capture and share knowledge Productivity can be increased Margins of errors will be reduced High flexibility It provides with timely and accurate information It allows communication within the branches of the organisation. Disadvantages: Installation can maintenance can be expensive. This may reduce face to face meetings with clients or business partners. 7.0 Management Information System Management information system (MIS) is a system that allows managers to make decisions for the successful operation of businesses. Management information systems consist of computer resources, people, and procedures used in the modern business enterprise. MIS also refers to the organization that develops and maintains most or all of the computer systems in the enterprise so that managers can make decisions. The goal of the MIS organization is to deliver information systems to the various levels of managers: Strategic, Tactical and Operational levels. Types of Information vary according to the levels of management. Strategic management will need information for long term planning and corporate strategy. This will be less structured. Tactical Management needs to take short term decisions to focus on improving profitability and performance. Operational management needs information on day to day operations of the organisation. 11.0 Conclusion Finally, I would like to conclude my report on Business Decision making. Firstly, I started with various method of data collection the analysis of the data gathered and prepared a sample questionnaire based on the example used. Then the presentation of data through tables have been discussed and continued with the information for decision making. Afterwards, I moved to evaluate the advantages and disadvantages of Intranet and its usefulness in controlling inventory. I also discussed about various inventory control methods used by organisations. Finally, I drew a conclusion on the investment decision scenario given. This report made me clearly understand all the subject areas I learnt in the lectures and I found it useful.

Thursday, September 19, 2019

Transformation in Louise Erdrichs The Red Convertible Essay -- Red C

Transformation in Louise Erdrich's The Red Convertible      Ã‚  Ã‚  Ã‚   In Louise Erdrich's "The Red Convertible," the two main characters start off doing seemingly well. However, there are many changes that these two young men go through during the story. Henry experiences the largest transformation due to his involvement in the Vietnam War. This transformation also alters Henry's brother, Lyman, although not for the same reasons. As the story progresses, and these certain events take place, the brothers' innocence is soon lost.   Ã‚  Ã‚   Before the war, the Lamartine brothers, Henry and Lyman, are naive and carefree. They spend all of their time together. They even buy a car together. This red convertible is the most notable way that Erdrich represents the boys' innocence in the story. To get this car, they spend all of the money they have, without even thinking about it. "[B]efore we had thought it over at all, the car belonged to us and our pockets were empty" (461). Soon after purchasing the red convertible, Henry and Lyman set off driving with no real destination. They simply explore the country, going where the road takes them. They have no responsibility, no worries, nowhere to be, and nothing that has to be done. The boys "just lived [their] everyday lives here to there" (461). Lyman and Henry fall asleep under willow trees, wake up, and begin driving again. During their expedition, they meet a girl named Susy. Susy lives in Chicken, Alaska, where they agree to take her. Upon reaching Alaska, the boys do not want to return home. There, where the sun never really sets in the summer, they hardly sleep at all. They live like animals. Before they leave, before winter, an interesting thing happens that truly exp... ...who endures pain. His brother, Lyman, suffers from many of the same things as Henry. Lyman also experiences post-traumatic stress. Although Lyman seems to acknowledge this stress in a rather different way than Henry, it is there all the same. Just as Henry tries to give the red convertible up to his brother, Lyman does the same in the end, and pushes it right back to him. The red car represents a bond between the two brothers, and with Henry gone, Lyman can not bear to have it around anymore. Unfortunately, getting rid of the car does not take care of Lyman's pain. Even a long time after Henry's death, Lyman still experiences post-traumatic stress.   Only now he has a tragedy of his own to endure.    Work Cited Erdrich, Louise. "The Red Convertible." The Story and Its Writer. 5th ed. Ed. Ann Charters.   Boston: Bedford/St. Martin's, 1999. 460-67. Transformation in Louise Erdrich's The Red Convertible Essay -- Red C Transformation in Louise Erdrich's The Red Convertible      Ã‚  Ã‚  Ã‚   In Louise Erdrich's "The Red Convertible," the two main characters start off doing seemingly well. However, there are many changes that these two young men go through during the story. Henry experiences the largest transformation due to his involvement in the Vietnam War. This transformation also alters Henry's brother, Lyman, although not for the same reasons. As the story progresses, and these certain events take place, the brothers' innocence is soon lost.   Ã‚  Ã‚   Before the war, the Lamartine brothers, Henry and Lyman, are naive and carefree. They spend all of their time together. They even buy a car together. This red convertible is the most notable way that Erdrich represents the boys' innocence in the story. To get this car, they spend all of the money they have, without even thinking about it. "[B]efore we had thought it over at all, the car belonged to us and our pockets were empty" (461). Soon after purchasing the red convertible, Henry and Lyman set off driving with no real destination. They simply explore the country, going where the road takes them. They have no responsibility, no worries, nowhere to be, and nothing that has to be done. The boys "just lived [their] everyday lives here to there" (461). Lyman and Henry fall asleep under willow trees, wake up, and begin driving again. During their expedition, they meet a girl named Susy. Susy lives in Chicken, Alaska, where they agree to take her. Upon reaching Alaska, the boys do not want to return home. There, where the sun never really sets in the summer, they hardly sleep at all. They live like animals. Before they leave, before winter, an interesting thing happens that truly exp... ...who endures pain. His brother, Lyman, suffers from many of the same things as Henry. Lyman also experiences post-traumatic stress. Although Lyman seems to acknowledge this stress in a rather different way than Henry, it is there all the same. Just as Henry tries to give the red convertible up to his brother, Lyman does the same in the end, and pushes it right back to him. The red car represents a bond between the two brothers, and with Henry gone, Lyman can not bear to have it around anymore. Unfortunately, getting rid of the car does not take care of Lyman's pain. Even a long time after Henry's death, Lyman still experiences post-traumatic stress.   Only now he has a tragedy of his own to endure.    Work Cited Erdrich, Louise. "The Red Convertible." The Story and Its Writer. 5th ed. Ed. Ann Charters.   Boston: Bedford/St. Martin's, 1999. 460-67.

Wednesday, September 18, 2019

Early Warning Signs in Elie Wiesels Night Essay -- essays research pa

Denying Life As a son watches his mother take her last breath on her deathbed, an overwhelming grief sets in. Although knowing that his mom smokes and drinks, he never told her to quit or ease up because he thought his mother can never die. In this case, the offset of this denial is his mom’s early death but, the denial by the Jews during 1942, caused a far more superior calamity, six million deaths! Alas, just like the boy who lost his mother, the Jews have signs and warnings to escape the invasion and Elie Wiesel does a superb job of incorporating that in his book, Night. These overlooked chances, or motifs, are Moshe not getting the respect for his word, uncomprehending the news that is given to the Jews, and the misjudgment of how evil a man Hitler is. If one is saved from a massacre of his or her own people, it is indispensable that he or she return back to his or her homeland and warn others of their approaching fate. This should give them enough time to pack their belongings and flee from their invaders. In Elie Wiesel’s painful memoir Night, there is a minor character that experiences this sequence, and his name is Moshe the Beadle. The only difference in the cycles is that when Moshe returns, nobody believes him of his incident. When Moshe returns, one citizen exclaims, â€Å"’He’s just trying to make us pity him. Or even: ‘Poor fellow, He’s gone mad.’† The cause of this persecution may be because of his â€Å"waiflike timidity,† but even so, heeding Moshe’s advice could have granted the Jews of Sighets’ protection from the Nazi concentration camps. An additional reason why Moshe was not given the proper respect might be because he was deeply religious. The o ther members in town may have been led to believe that Moshe had s... ...f the major Optimism of the Jews is that they could not comprehend the killing of all their people. They see it as a task that contains no possible way to be fulfilled. They justify it by saying â€Å"Was he going to wipe out a whole people? Could he exterminate a population scattered throughout so many countries? So many millions! What methods could he use?† (6). The answer to their question is yes but there is many chances to escape this fate, although the Jews of Sighet deny it. Understating Hitler, denying the media, and not realizing the depth of Hitler’s evil, were all the motifs shown above and is proof on how the Jews of Sighet deny their warning signs of an upcoming holocaust. Heeding these signs may have granted many of them life in a place that manufactured death. And when the race toward death began, it was the village idiot that came out to be the smartest.

Tuesday, September 17, 2019

Cyberethics - Ethics in the Age of the Internet :: Internet Online Communication Essays

Cyberethics - Ethics in the Age of the Internet In every society we live, we have to follow the rule of that place. The Internet is growing, growing in the number of users and growing in public perception. The Internet is the new American frontier due to the new technologies is radically transforming almost every aspect of how we communicate and with whom, as well as just about any dimension of our lives. Most Internet users are convinced of its general utility and positive benefits. However behind it, the Internet, as well as its technological offspring’s the World Wide Web has been compared to the Wild West, because no one owns the network and there is no law and regulations. In consequence of the growth of the Internet, there have been increasing calls for its regulation from many sides. NEW MEDIA The new medium of the Internet has begun to create shadow versions of our older media (Crowley 303). William J. Mitchell likens computers as media to a frontier society (Crowley 303). New media technologies beckon more enticingly than ever. More than merely offering an improvement on existing forms of communication, new media technologies are creating what telecommunications scholar Frederick Williams calls a â€Å"virtually new medium of public communication† (Pavlik, 79). The Internet is a form of new media. Exploiting the Internet’s distribution channels will be an important challenge to publishing and other media industries in the next few years. The initial problem is that no one owns the network. The Internet continues to expand both in terms of audience and the range of its information services. Among other benefits, it offers American media companies an important channel for searching both old and new audiences. Until recently, Canada's broadcast and telecommuni cations watchdog is gearing up to tackle a potentially explosive issue -- whether it should try to regulate the Internet. The CRTC (Canadian Radio-television and Telecommunications Commission) said regulation could be used to promote Canadian culture or protect Canadians -- particularly youngsters -- from obscenities such as pornography and hate propaganda on the Internet (Brehl). However later, the CRTC announced that it will not regulate new media services on the Internet. After conducting an in-depth review under the Broadcasting Act and the Telecommunications Act beginning last July, the CRTC has concluded that the new media on the Internet are achieving the goals of the Broadcasting Act and are vibrant, highly competitive and successful without regulation.

Monday, September 16, 2019

Six sigma

The major changes in the new standards are the increased focus on commitment from top management, customer satisfaction, emphasis on processes, and continual improvement. 2. ISO sass's evolution has steered it away from the Total Quality Management philosophy. 3. Organizations should be Just as concerned about the quality of their services s they are about the quality of their product. . ISO introduced organizations to the concept of the internal customer. 5. Service and service delivery characteristics are not measurable. 6. An internal audit is performed by an entity other than the organization. 7. For registered organizations three levels of audits are used to verify the integrity of the quality management system. 8. Assignable causes are always bad causes which will result in special variations. 9. Because of the central limit theorem, the standard deviation of the sampling striation is equal to the population standard deviation. 0. When DAMP = 21, the process sigma level is abou t 5. 6 sigma. II. Multiple Choice: Circle the letter before the correct answer in each of the following questions. (5 questions, 2 points each, total 10 points) 1 . Which of the following statements is true concerning the U. S. Representative to ‘SO, ANSI? A. The American National Standards Institute was founded in 1985 B. Ann.'s members include less than 500 US businesses C. ANSI is the administrator and coordinator of the US voluntary standardization system D. All of the above statements are true 2.Throughout the text of this international standard, wherever the term â€Å"product† occurs, it can also mean A. Process B. Repair C. Service D. None of above 3. When reading an ISO 9001 standard, it is a good idea to apply which of the following approaches? A. Read the clause verbatim B. Formulate an explanation of the requirement and write them down C. Ask yourself how this requirement actually applies to your organization D. Apply all of the above approaches 4. Top manag ement should establish a customer-oriented organization by A.Defining systems and processes that can be clearly understood, managed, and improved in effectiveness as well as efficiency B. Insuring effective and efficient operation and control of processes and the measures and data used to determine satisfactory performance of the organization C. Both a and b D. None of the above 5. ISO 9000 documentation is typically comprised of which four levels? A. Policy, procedure, practice, proof B. Records, quality manual, practice, proof C. Manual, clause procedures, documentation, proof D. None of the above are the four levels of documentationIll. Based on what you learned from the classes and your understanding, summarize how to start a six sigma, and the major steps of a six sigma projects. Briefly discuss the useful tools in the first two phases (D, M). Organize your answer properly and use less than 300 words.

Sunday, September 15, 2019

Software and Hardware System Requirements for a Project

Chapter 5Requirement AnalysisThe chapter describe security model demand and which is categorised on the footing of user interaction and specification of package and hardware demand. Besides its overview regulations assign to the assorted user. 5.1 Software RequirementNameDetailssOperating SystemWindows XP and UpperDatabase ServerMySql, XMLFront EndNetbeans 7.2, JSP, Java SDK 6.0Application ServerTomcat 6.0BrowserIE 5.0 and Upper or Mozilla, Google ChromeTable No 4.1 Software Requirement 5.2Hardware RequirementNameDetailssProcessorPentium IV and supra.Random-access memory256MB and aboveHard Drive40 GBNetworkLocal area networkTable No 4.2 Software Requirement 5.3High Level Process Diagrams A high degree description of the demands of the undertaking is to manage specific defined maps utilizing a common platform, whilst other maps for content, enrollment, individuality direction, and increasing security to single applications will be outside the range of the undertaking and this range is detailed in the diagram below: Figure 5.1: Scope of the Undertaking This stage of the undertaking will cover individual factor hallmark and will merely capture username and watchword to authenticate a website user. The demands are split into four subdivisions:Generic demandsSelf disposal functionalityDelegated disposal functionalityHelp Desk disposal.The generic demands will embrace certain facets that are generic across the ego disposal and delegated disposal functionality. The undertaking will present the following generic demands for self disposal and delegated disposal: Figure 5.2: Generic demands for self disposal and delegated disposal The undertaking will present the following self disposal functionality: Figure 5.3: Self disposal functionality The undertaking will besides present the followers delegated disposal functionality: Figure 5.4: Delegated disposal functionality There will besides be the undermentioned Help Desk disposal functionality that will be delivered by the undertaking: Figure 5.5: Aid Desk disposal functionality5.4 User groupsUser groupDescriptionExternal web site userAn external web site visitant to any web site or applicationAdministratorAn internal decision maker who will hold the capableness to supply entree direction to application specific external web site usersHelp Desk AdministratorAn internal decision maker who will hold the capableness to back up the security model and users of the modelTable No 5.3: User Groups5.5 Requirements5.5.1 Generic demandsGEN-0011-Rule-2For Self disposal and decision maker for delegated disposal enrollment signifiers, the information Fieldss must be blank on first burden of the signifier.GEN-0011-Rule-3The system will non auto-generate usernames for decision makers for delegated disposal. The usernames will be entered manually.GEN-0011-Rule-4When the web site user receives the invitation electronic mail and clicks the URL to lade the enrollment signifier, the username on the signifier will be pre-populated and n ot-editable.GEN-0011-Rule-5Auto-complete must be set to murder.GEN-0011-Rule-6Password and replies to security inquiries must be obscured.GEN-0011-Rule-7The username can non be an email reference.GEN-0011-Rule-8The website user must put up 4 security inquiries, of which 2 will be indiscriminately shown during future hallmark procedures.GEN-0011-Rule-9Security replies must non:Be cleanRepeat replies across the inquiriesBe individual figure or character repliesGEN-0011-Rule-10The replies to the security inquiries will be a minimal 3 alphameric characters, with a maximal 20 alphameric characters and must non incorporate the undermentioned particular characters:â€Å" ! ? $ % ? / or @GEN-0011-Rule-11Website users will merely be registered for applications/websites within a pre-defined group, i.e. for either BHW applications or international applicationsGEN-0011-Rule-12The format of the username will be a minimal 6 alphameric characters, with a upper limit of 20 alphameric characters an d must non incorporate the undermentioned particular characters:â€Å" ! ? $ % ? / or @The username will be instance sensitive.GEN-0011-Rule-13The format of the watchword will be a minimal 8 alphameric characters, with a upper limit of 20 alphameric characters and must be instance sensitive.GEN-0011-Note-1:The application specific demands for informations gaining control are non documented in this DBRS and will be documented at the application specific degree.GEN-0011-Note-2:The signifier will non capture opt-in /opt-out for selling intents. This will be done at application degree and non at the security degree.GEN-0011-Note-3:Website users will be able to register for specific merchandises at an application degree.GEN-0011-Note-4:The website user will merely be able to take a security inquiry one time from the list, i.e. the inquiry selected in ‘Security inquiry 1’ will non look in the dropdown for ‘Security inquiry 2’ and so on.GEN-0011-Note-5:Any indivi duality inside informations, i.e. name and reference, will be captured at an application degree.GEN-0012Send electronic mail verification on successful enrollment to the web site userGEN-0012-Note-1:A concern determination has been made to go on with the preferable option that does non necessitate email confirmation and therefore to merely hold one measure enrollment. The website users will have an electronic mail corroborating that they have registered successfully.GEN-0012-Note-2: Without capturing more informations on the enrollment signifier, any electronic mails that are sent will non be customised to the website user and the salute will be ‘Dear User.’GEN-0013Post log-in, all designated assets ( pages ) will be protected by the Security Platform.GEN-0020The watchword strength must be either medium or strong and must be displayed on the undermentioned signifiers:RegistrationChange watchwordSecurity inside informationsGEN-0020-Rule-1Mandatory ( 1 point each and a en tire 2 points in the marking mechanism )Minimum of8 characters in lengthMaximum of 20 characters in lengthA combination of letters and at least 1 figureOptional ( 1 point each )At least one particular character from this list @ , # , $ , ^ , & A ; , _ , ~ , –A mixture of upper and lower instance lettersPoints scoredDisplay& lt ; = 2Weak ( Red saloon )3Medium ( Amber saloon )4Strong ( Green saloon )GEN-0020-Rule-2The watchword strength saloon will expose the coloring material and besides the diction to follow with the Accessibility criterionsGEN-0020-Rule-3On page burden the watchword strength index will be clean.GEN-0030The enrollment signifier must incorporate Captcha functionalityGEN-0030-Rule-1The Captcha functionality must follow with the Accessibility criterionsGEN-0030-Rule-2The Captcha functionality must be instance sensitive.GEN-0040Provide registered website users with the ability to login to an application or merchandise on any web site that has migrated to the Secu rity FrameworkGEN-0040-Note-1:While the website user will be able to login to any web site or application, they may be required to register for each merchandise at an application degree.GEN-0050Website users must be able to reset their watchword through disregarded watchword functionalityGEN-0050-Rule-1The website users must reply 2 security inquiry ( s ) right to reset their watchword.GEN-0050-Rule-2The 2 inquiries will be displayed indiscriminately for the set of 4 inquiries answered on initial enrollment.GEN-0060Website users must be able to recover their username through disregarded username functionality to reconstruct their ability to log in.GEN-0060-Rule-1An electronic mail will be generated incorporating the website user’s username.GEN-0070A website users account will be locked if the website user exceeds the maximal figure of login efforts or fails to reply their security inquiries rightGEN-0070-Rule-1There should be 2 error messages:For inputting incorrect inside in formations, e.g. username and watchwordFor history lockupGEN-0070-Note-1:The figure of login efforts and replying of security inquiries should be set to 3 efforts, so the history is locked and an enlightening mistake message is displayed.GEN-0070-Note-2:For the history unlock procedure, web site users will be advised to reach the Help Desk in order to unlock their history.GEN-0070-Note-2:There will be three history lock out periods. The first two lockouts will be impermanent and last for 20 proceedingss. The concluding lockout will be lasting and necessitate Helpdesk to unlock the history.GEN-0080The system must be able to run out a web site users password at a specified interval, e.g. monthlyPremise:The watchword termination will be set at a generic degree and if an application requires an alternate watchword termination policy, this must be applied at the application specific degreeGEN-0090The system must be able to stop a user session after a specified period of inaction on the w eb site.GEN-0090-Rule-1The in agreement length of clip for the period of inaction must be set across the platform and non at application degree.GEN-0090-Rule-2The inaction timeout will be configured to 20 proceedingss.GEN-0100Functionality must be provided to let the website user to log out of the Security Framework.GEN-0100-Note-1:The logout user journey will be an application degree specific user journey.GEN-0100-Note-2:This will be locally configurable for each concern unit.GEN-0110Provide individual sign-on capableness such that when a website user registries for one web site or application, they are able to login to another web site or application.GEN-0110-Note-1:While the website user will be able to login to any web site or application, they may be required to register for each merchandise at an application degree.GEN-0120The system should supply scrutinizing and describing functionality of both self disposal web site users and delegated disposal web site users.GEN-0120-Note- 1: This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.GEN-0120-Note-2:Any web analytical coverage will be provided through the Omniture toolGEN-0130The system should supply scrutinizing and describing functionality of the decision makers using the delegated disposal toolsGEN-0130-Note-1: This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.GEN-0130-Note-2:Any web analytical coverage will be provided through the Omniture toolGEN-0140The concern units should supply an attack and procedure for managing website users concerned with possible history via media, whether this be via electronic mail or via a Call CentreGEN-0150The system must dispute an terminal user when they:Attempt to entree unauthorized contentAttempt to entree via a bookmark when already logged outGEN-0160The system shall be capable of observing that a user is logging in a 2nd clip from a different topographic point, in which instance the installation should be configurable to reject the 2nd session, end the bing session, or permit coincident Sessionss.Table No.5.4: Generic demands5.5.2 Self disposal demandsRqt No.DescriptionSource/OwnerPrecedenceSA-0020Provide registered and logged in website users with self disposal capablenesss to alter their generic security inside informationsSA-0020-Rule-1A website user must be able to amend the undermentioned security inside informations:Email referencePasswordSecurity inquiries and repliesSA-0020-Rule-1A website user will non be able to amend the username.SA-0020-Note-1:Any application or merchandise specific informations will be amended at application or merchandise degree and as such will non be documented in this DBRS and will be documented at the application specific degree.SA-0021The system must direct an electronic mail to the registered web site user when an amendment has been made to their inside informationsSA-0021-Rule-1The electronic mail must province which inside informations have been amended, butnonwhat the inside informations have been changed from or to.SA-0021-Rule-2If the web site user has amended their electronic mail reference, the system must direct an electronic mail to the old and new electronic mail references advising of the amendment.SA-0021-Note-1:This electronic mail will besides incorporate instructional text for the web site users in instance they are concerned that their history has been compromised.Table No. 5.5: Self disposal demands5.5.3Delegated disposal demandsRqt No.DescriptionSource/OwnerPrecedenceDA-0010Provide decision makers with delegated disposal capablenesss to make an history for external web site usersDA-0010-Rule-1decision makers will merely be able to register Website users for applications/websites within a pre-defined group, i.e. for either BHW applications or international applications.DA-0010-Rule-1decision makers will non be able to utilize the same username across pre-defined groups as the username must be alone.DA-0011Provide decision makers with the ability to advise website users of their enrollment inside informations via an invitation electronic mailDA-0011-Rule-1The point at which the invitation electronic mail is sent to the website user will be configurable for each application, i.e. the electronic mail may be sent when the user has been created by the decision maker or at a ulterior phase following updating of application specific history inside informations.DA-0012Provide decision makers with delegated disposal capablenesss to modify an bing history electronic mail referenceDA-0012-Rule-1The system must direct an electronic mail to the registered web site user when an amendment has been made to their inside informations by the decision maker.DA-0012-Note-1:The decision maker will merely be able to modify the electronic mail reference for an history.DA-0013Provide decision makers with the ability to seek for an bing web site user by username and/or electronic mail.DA-0013-Rule-1The hunt capableness will be application degree particular and will non return users non registered for that application.DA-0014Provide decision makers with delegated disposal capablenesss to disenable and enable an bing history from the applicationDA-0014-Rule-1The decision maker will merely be able to disenable an bing history from the specific application the decision maker is logged into. The decision maker will merely be able to enable an history if it has antecedently been disabled from the application.DA-0014-Rule-2Presentment must be sent to the Help Desk decision makers when a user has been disabled for a specific application.DA-0014-Rule-3Presentment must be sent to the bing user when their application particular history has been enabled.DA-0015Provide decision makers with the ability to re-send an invitation electronic mail to a website user during the URL expiry period and post the URL expiry period.DA-0015-Rule-1This functionality will merely be available if the web site user has non logged in and completed their profile for the first clip.DA-0015-Rule-2If the invitation is re-sent during the expiry period, so the URL from the initial electronic mail will be invalid and the expiry period will be resetDA-0020Invitation electronic mails from the delegated decision maker must incorporate the undermentioned information for the website user:User nameEncrypted URL to automatically log the user into their historyDA-0020-Rule-1The URL will run out on first successful usage and the website user must alter the watchword, enter their personal inside informations, select the security inquiries and input their replies to their chosen security inquiries on loginDA-0020-Rule-2The fresh URL should be expired after a configurable clip period and the recommendation is that this is less than 2 hebdomads.DA-0020-Rule-3As a lower limit the watchword must be encrypted.DA-0030Hard transcript invitations could be sent from the delegated decision maker and must incorporate the undermentioned information for the website user:User nameImpermanent watchwordFriendly URLDA-0030-Rule-1The impermanent watchword will run out on first usage and the website user must alter the watchword, enter their personal inside informations, select the security inquiries and input their replies to their chosen security inquiries on loginDA-0030-Note-1:The ability to capture reference inside informations for poster of the difficult transcript invitations has non been captured in this DBRS and will be documented at the application specific degree.DA-0030-Note-2:The concern procedure for the despatching of the difficult transcript invitation is out of range of the Security Platform and must be put in topographic point by the concern unitsDA-0040Provide decision makers with the screens and functionality for the delegated disposal which will be deployed at an application specific degree.DA-0060Provide decision makers with the ability to re-enable a user that has antecedently been disabled from the applicationDA-0070Provide decision makers with the ability to seek for handicapped users by username or electronic mail.Table No 5.6: Delegated disposal demands5.5.4Help desk disposal demandsRqt No.DescriptionSYS-0010Provide Help Desk decision makers with the ability to:Search for an historyModify an historyDisable an historyEnable an historyDe-register an history from the security modelRe-register an history on the security modelDe-register an history from an applicationRe-register an history to an applicationUnlock an historyReset watchwordUpload users in majoritySYS-0010-Rule-1The Help Desk decision makers will be able to de-register an history at the security model degree. This will forestall the website user from logging into any application and sites.SYS-0010-Rule-2Presentment must be sent to each of the decision makers when a user has been de-registered at the security model degreeSYS-0010-Rule-3Presentment must be sent to the bing user when their history has been de-registered from the Security FrameworkSYS-0010-Rule-4Presentment must be sent to the bing user when their history has been modified in any manner on the Security Framework.SYS-0010-Note-1: This functionality will be provided to the Help Desk Administrators as a portion of the Oracle Identity and Access merchandise suite.SYS-0010-Note-1:An electronic mail will be sent to the termin al user for the alteration of each property.Table No. 5.7: Aid desk disposal demands