Tuesday, December 24, 2019

Kurt Vonneguts Opinions Expressed in Player Piano, Cats...

Kurt Vonnegut’s Opinions Expressed in Player Piano, Cat’s Cradle, and Slaughterhouse-Five Every so often, a person comes along and encompasses the meaning of a generation. This person will capture everything people want to say, and then word it so well that his or her name becomes legendary. The sixties was an era with many of these people, each with his or her own means of reaching the people. Kurt Vonnegut, Jr., armed with a typewriter and a motive, was amongst those that defined the sixties. Like other notable figures of the sixties, his strong opinions moved the people. Vonnegut’s opinions cover a wide range of topics and address almost all aspects of society. He represented the flower children of the sixties, as he†¦show more content†¦He attended Cornell University from1940 to 1942, and the Carnegie Institute of Technology in 1943. From 1942 to 1945, he served in the United States infantry in Europe during World War II (Ethridge 1-4: 970-971). According to Stanley Schalt’s book Kurt Vonnegut, Jr., Vonnegut was captured at the Battle of the Bulge and then sent to Dresden to work in a factory producing vitamin supplements for pregnant women (n. pag.). He was awarded the Purple Heart for his efforts. Vonnegut then came home, where he continued his college education by attending the University of Chicago from 1945 to 1947. He married Jane Cox in 1945 and eventually fathered three children, their names being Mark, Edith, and Nanette. After the war, he was a Chicago City News Bureau Police Reporter in 1947. Before he became a writer, he also worked with Public Relations for General Electric in Schenectady, New York from 1947 to 1950 (Ethridge 1-4: 970). In 1950, Vonnegut decided to become a writer, with his first novel, Player Piano, being published in 1951. He would later go on to write works such as Canary in a Cat House (1959), Mother Night (1961), Cat’s Cradle (1963), God Bless You, Mr. Rosewater (1965), Slaughterhouse-Five (1969), and Breakfast of Champions (1973). His most renowned work, Slaughterhouse-Five, is as close to an autobiography as he comes. In Slaughterhouse-Five, Vonnegut writes a novel based his experience as a prisoner of war

Monday, December 16, 2019

Festival and Events Free Essays

Executive Summary The charity sector is large and growing, and has substantial assets at its disposal. Sport charities today form an increasingly important part for the local economy and also promoting healthy living at the same time (Fill, Groan and Fairly, 2012). Serve your racquets! A racquet sports charity event organized by Starry Family. We will write a custom essay sample on Festival and Events or any similar topic only for you Order Now It is a unique sport charity event as it only focuses on racquet based sports, organized to raise funds to help and support single parent’s in the State of Victoria, Australia. Serve your racquets! S to be held at major sporting venues in and around the City of Melbourne on the last two weeks of November 2013 with local celebrities taking part in the games to promote the noble cause aimed at promoting family wellness and healthy living. While sport participation continues to represent a prominent aspect of leisure and recreation, there has also been a pronounced shift toward support of charitable causes for both individual consumers and corporations (King, 2001). Giving to charity is a complex decision driven by a variety of motives. Research has shown that reciprocity is an important motivating factor for charitable donations among young professionals today (Fill, Funk and O’brien, 2010). Reciprocity involves an individual giving to charity because he or she has benefited from, or anticipates benefiting from, the charity’s central activities. Research has also suggested motives related to inherent needs of donors such as self-esteem and the need to help others (Ruthenium, 2000, as cited in Fill, Funk and O’brien, 2010). 1 . Serve your racquets! The idea/theme of this sports charity is that it only focuses on racquet sports such as tennis, badminton, squash and table tennis and etc to raise funds for single parent’s facing difficulties in their everyday life. It is a unique charity event which is open to he public over a period of the last 2 weeks in the month of November 2013, allowing more participation from the public. What makes it exciting is that participants of the event is allowed to wear any costumes they like as long it is not revealing or indecent clothing. The principle of Serve your racquets! The aim of Serve your racquets! Is to educate the greater community in order to increase their awareness of everyday problems/challenges faced by single parent’s. To do this, sports is involved as it is the most common activities in the world, with participation in very country and at all levels of society. Sports have a strong history all levels of society which in turn allows both the participants and the public at large to help those in need by meaner of education and awareness and living a healthy lifestyle at the same time (Fill, Groan and Fairly, 2012). Here is the general outline of the purpose of the sports charity event concept: The purpose of this concept is so that once completed, evaluations can be done to see if the event can be delivered successfully within the available timeshare and resources. This process is known as the feasibility study (Allen, Harris and McDonnell, 2008). There are three steps in the feasibility study related to events. 1 . The marketing screen 2. The operations screen 3. The financial screen The marketing screen involves examining how the target audience of the event is likely to respond to the event concept (All et al. 008). This meaner that the event managers will need to pay a great deal of attention to media responses and the responses (feedbacks) of those who hear about the event concept. Event successfully, and whether the event managers have these skills and resources or have access to them (Allen et al. 2002). In this case any resources or skills required or the event are generously available, such as security, medical standby services and food stalls. This screen examines whether the event organization has the sufficient financial commitment, sponsorship and revenue to undertake the event (Allen et al. 008). Optimistically the event will have some form of sponsorship support as described in the stakeholder section, and if objectives are reached there will be a profit of over hundred thousand dollars. The key target of the event The goals of the Serve your racquets! Event is to: 1. To raise funds to help and support single parent’s. 2. To attract at least ten thousand attendees during the 2 weakling events. 3. Raise over two hundred and fifty thousand dollars in participation fees alone. 4. To earn recognition from all stakeholders (including the public) during the event to formulate it into a major event. 2. The stakeholders of Serve your racquets! Event. L. The organizer Starry Family as the main organizer that will be running the event. II. Internal staff (or Volunteers) The event will require area managers who coordinate the activities in each area (in and around the City of Melbourne), guidance staff who inform and direct attendees and participants, medics for health and emergency services and security in case of any unwanted activities and disturbances. Ill. Event planner/manager Event planner and general manager who coordinates and provides logistics for the event. The people who signed up for the event or attending to watch the events. There will be those that come to the event for purely for entertainment reasons, and those who will get involved in buying and selling merchandise. V. Sponsors In the recent decades, sponsorship is no longer seen as a measure of goodwill, but a primary promotional tool in the market mix (Conway, 2004). Therefore it is very likely that this event will receive some benefits from sponsors. VI. Media The many forms of media that will be used to promote and advertise the event is through social media websites, radio along with newspaper advertisements with details such as date, venue, participant fees and other important event details that participants may be interested in. 3. Marketing/Promotion With technology growing at a fast pace, marketing/promoting the â€Å"Serve your racquets! † event through certain media sources can result in positive revenue and create more attention to the not only fans of the sports but the broader audience. With the rapid growth in social media websites and the easy-to-access ideal through smart phone APS, this form of marketing can become very beneficial in the long run (Wolf, Here, and Walker, 2013). The most commonly used websites to promote a sport charity event through social media are Faceable and Twitter. Besides that, advertisement will be made on newspapers with announcements on the radio. Marketing this event through social media websites can be a very handy way to create awareness and recognition as Faceable has received more than 1. Billion visits a week and twitter receives more than 400 million visits a month (Sullivan, 012). A website linked by social media application will provide the event details such as date, venue, fees and other important event details that participants may be interested in. 4. Contested Meaning Other important decisions that need to be made whilst developing an event concept is the duration of the event and the season, days and times when the event will be held (Allen et al. 2002). The event will be held on the last two weeks of November. Reason being that though it is an outdoor and indoor event the good weather conditions are beneficial as more people would be willing to go out as often as possible. The two weakling events will start on Sunday the seventeenth of November and it will end on Saturday the thirtieth of November. The event times are: Weekdays, am – pm Weekend, loam – pm The weekdays are predicted to attract the seniors and non workers, while the weekend is predicted to attract families and young adults who work on weekdays. The event is expected to be held at the Rod Lever Arena and at the Melbourne Convention and Exhibition Centre. The reason of the choice of venues is that both host venues has very good access to public transportation and both venues as ample of space to host various racquet games. 6. Community Benefit At least 40% of the collected fees will be used to cover necessary expenses incurred during the event. Meanwhile, the rest of the 60% of the collected fees along all personal and pledged donations will go 100% directly to Starry Family for the benefits of single parent’s in the State of Victoria. This will help improve and provide a sustainable path for thousands of single parent’s. Besides that, the local community has the opportunity to take part in the events to exercise further boosting the image 7. Estimated Economic Impact Starry Family as the organizer will have to rent booths, and tents on venues, generating income for the host of the respective sporting venues. Starry Family will also be setting up booths for sport retailers to sell their sport equipment and merchandise as well as souvenirs for the event. Attendees and/or participants will likely spend money both at the event and in the surrounding community (those traveling to the sporting venues). This will surely boost revenue for businesses located in and round the city as well as making full use of the public transport. 9. List of sponsors Request for sponsorship has been made to the Commonwealth Bank (Australia’s largest bank), Rebel Sport (sporting and leisure equipment retailer), Mercer (global leader in HER and related financial advice), The City of Melbourne (as the venue partner) and Woolworth (Australia’s largest food retailer). 0. Media and broadcast coverage There will be media coverage by Channel Ten, BBC local radio as well as the Herald Sun newspaper to report on the highlights and latest happenings during the event. 1 1 . Seeking Government funding Request has been made to the State Government of Victoria for funds to partially over the cost of organizing the event if 100% of all personal and pledged do nations are to be made to Singleness (Australia’s biggest charity for single parent’s). The contribution of recreation and charity motives in the development of attachment demonstrates motives related to leisure including escape, social, competency, and intellectual. With motives related to charitable giving such as reciprocity, self-esteem, need to help others, and desire to improve the charity play a part in a sport event taking on enhanced importance and greater meaning for participants (Wolf, Here, and walker, 2013). How to cite Festival and Events, Papers

Sunday, December 8, 2019

Macbeth Verdict Not Guilty! Essay Example For Students

Macbeth: Verdict Not Guilty! Essay Macbeth, the InnocentGood day. Today I will prove to you that Macbeth, the king of Scotland, is innocent. It is outrageous that anyone in this courtroom should think otherwise. There are three key factors to consider before it is possible to make any judgment concerning the murderer of Duncan. First of all, before fingers are pointed at Macbeth, I ask you to consider if he is the only suspicious person? A murderer must have a motive and an opportunity. Obviously, there are several candidates that fit this category. Also, before you can reach a final decision, you must consider the character of the individual. Macbeth is a man of the finest character; he does not have the nature of a cold-blooded killer. I am sure you will agree with me long before you go into the jury room. Finally, the will of the gods must be taken into consideration. It is not within the powers of mortals, even important mortals like Macbeth, to change the future as determined by the stars. I am confident that you, dear jury, will consider the three factors I will shortly describe and realize that Macbeth is a most unlikely suspect. First of all, Macbeth is not the only suspicious person. After all, where were the sons of Duncan just minutes after their fathers brutal murder? You would think that sons who really care about their father would want to discover the truth. What kind of son just runs off and vanishes when he learns of the horrific death of his own father? Where were Malcolm and Donalbain? If anyone here in this court lost a loved one, no one would turn his back, especially to a father. But these young men, next in line to the throne, decided it would be a better idea to wait for the heat to go down. The only possible explanation is that they, themselves, felt guilty. Sadly, I fear, we must also look at Lady Macbeth. Although it is unpleasant to speak ill of the dead, I ask you, why is the Lady dead? We all know that in the period of time before her death she was crazy and possessed. She walked around the castle rubbing her hands and trying to remove the stains of blood that she thought she saw there. Does this sound like an innocent woman? She believed that Macbeth was weak and not driven. She thought he was a man who avoids evil. In fact, she actually thought that she was more of a man than her own dear husband when it came to taking action to achieve the selfish goals she wanted to attain. Lady Macbeth said,. . . Come, you spirits That tend on mortal thoughts, unsex me here, And fill me from the crown to the toe top-full Of direst cruelty. (I.v. 38-40)Does this sound like a poor, frail woman? I dont think so. If Lady Macbeth wanted something, she took it. She knew that she could never rely on her husband, Macbeth, to do any kind of dirty work. When Macbeth refused to listen to her selfish, egotistical desires, Lady Macbeth simply did what she needed to do to get what she wanted the power and status of a queen. If she was innocent of this horrendous crime, why would she be washing and rubbing her hands all day and night? As you can see, there are a few people who appear to be much more likely candidates for the murder of Duncan than Macbeth. Not only do Malcolm, Donalbain, and Lady Macbeth have motives to commit this act of murder, their behaviour also makes them look very guilty. But there are other reasons that prove that Macbeth would never murder Duncan. Macbeth has always been faithful to the late Duncan. .u9b20af370adfa36cb4a50ddd052dd4e8 , .u9b20af370adfa36cb4a50ddd052dd4e8 .postImageUrl , .u9b20af370adfa36cb4a50ddd052dd4e8 .centered-text-area { min-height: 80px; position: relative; } .u9b20af370adfa36cb4a50ddd052dd4e8 , .u9b20af370adfa36cb4a50ddd052dd4e8:hover , .u9b20af370adfa36cb4a50ddd052dd4e8:visited , .u9b20af370adfa36cb4a50ddd052dd4e8:active { border:0!important; } .u9b20af370adfa36cb4a50ddd052dd4e8 .clearfix:after { content: ""; display: table; clear: both; } .u9b20af370adfa36cb4a50ddd052dd4e8 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u9b20af370adfa36cb4a50ddd052dd4e8:active , .u9b20af370adfa36cb4a50ddd052dd4e8:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u9b20af370adfa36cb4a50ddd052dd4e8 .centered-text-area { width: 100%; position: relative ; } .u9b20af370adfa36cb4a50ddd052dd4e8 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u9b20af370adfa36cb4a50ddd052dd4e8 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u9b20af370adfa36cb4a50ddd052dd4e8 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u9b20af370adfa36cb4a50ddd052dd4e8:hover .ctaButton { background-color: #34495E!important; } .u9b20af370adfa36cb4a50ddd052dd4e8 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u9b20af370adfa36cb4a50ddd052dd4e8 .u9b20af370adfa36cb4a50ddd052dd4e8-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u9b20af370adfa36cb4a50ddd052dd4e8:after { content: ""; display: block; clear: both; } READ: Wide Sargasso Sea vs Jane Eyre Essay The two of them admired and enjoyed each others company. Just days before his death, Duncan gave Macbeth a new title for being a great general and a noble supporter of Scotland. Duncan recognized Macbeth as a valued and loyal countryman. Duncan told Ross to announce the death of the previous Thane of Cawdor And with his former title greet Macbeth (I. iii.67) because What he hath lost noble Macbeth hath won. (I.iii. 69) If Macbeth wanted Duncan to die, dont you think that Duncan, the great, wise and respected monarch, would have had a suspicion that Macbeth was up to something? Duncan even slept at Macbeths house. Well, kings dont go and sleep at just anyones home. Obviously, Duncan trusted Macbeth with his own life. If Duncan had this kind of faith in Macbeth who are we to now suspect this man of treason? Macbeth respected Duncan and loved him with all his heart. Besides, even if Macbeth contemplated this horrible crime, there is no reason in the world for him to expect that he would be crowned king after Duncan. Macbeth wasnt Duncans relative. Everyone knows that the kingdom is passed from father to son not from king to loyal servant. It would be completely ridiculous for Macbeth to even think that he stood a chance to become king; its not like Duncan was childless. In fact, Duncan has two sons who are potential heirs to his throne. Macbeth is not a stupid man. He knows how the monarchy system works. Logically, if Macbeth had actually thought up this murder, he would have had to murder Duncans two sons at the same time that he killed Duncan. Nothing of the sort ever happened. Finally, the death of the king was prophesized to happen. The witches, the unearthly messengers of the gods, foretold of many events that would occur. They were never wrong. After all, it is impossible to stop fate. When something is going to happen it will follow through and happen. The third Witch said, All hail, Macbeth! That shalt be King hereafter. (I. iii.50) Sadly, Duncans fate was sealed with this prophesy. The only thing that was not known was when the deed would take place. Each person has a destiny. We cannot stop destiny any more than we can stop a storm or an earthquake. In conclusion, Macbeth stands before you an innocent man. Unlike other people, such as Malcolm, Donalbain and even Lady Macbeth, Macbeth had no motive to commit this murder. Also, Macbeth is not the kind of person who would assassinate a king. Macbeth has proven his loyalty to Scotland and to Duncan. He even risked his own life, without thought for himself, to protect Scotland and Duncan. This kind of person does not go around committing murder. Finally, no one has the power to change destiny. If Duncans fate was to die than the kings end was predetermined regardless of Macbeth or any other individual. Even the mighty Caesar could not stop destiny. For these reasons, I believe you will find Macbeth not guilty.

Saturday, November 30, 2019

Jysk Porter 5 Forces Essay Example

Jysk Porter 5 Forces Paper For the external analysis I will do a Porter 5-Force analysis on the Micro environment of JYSK on the Chinese market. First I want to have a look at the Industry competitors, so the rivalry. If we take a look on the Chinese market, we can see that there is already a fierce competition going on the market. Domestic and foreign retailers like IKEA or Wal-Mart have already successful penetrated the market. The number will increase constantly, because everybody wants a piece of the cake. If we look at the entry market for JYSK, that would be Shanghai, so there is already a large furniture center. There is no concept like JYSK so far, but most of the segments they serve are already covered, like mattresses. The Chinese market suffers from plagiarism; there is no uniqueness due to that. Next I want to have a look at the potential entrants. In general there are no big entry barriers; it’s easy to penetrate the market. Costs are quiet low. The sorts of concepts you can offer are limited, there is no franchise retail chain on the market yet. We will write a custom essay sample on Jysk Porter 5 Forces specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Jysk Porter 5 Forces specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Jysk Porter 5 Forces specifically for you FOR ONLY $16.38 $13.9/page Hire Writer IKEA is similar, but different because it’s a self-service shop. The advantage of being a famous European chain is no advantage in china any more, Chinese are brand fixed, but they don’t know European brands on the market that much. For the potential entrants there is to mention, that almost the whole world wants to join the Chinese market and there is and there will be even more beginners. Next I want to have a look at the substitutes. Substitutes do not exist due to the uniqueness of the product-level. It’s almost impossible to substitute a mattress, of course you can use an air mattress, but the possible substitutes are not worth to be mentioned. The big problem is the Chinese patent system, because there is none, the market suffers from plagiarism. Next I want to have a look at the buyers and there Power. The bargaining power of furniture buyers in china is pretty low. Furniture creates less significance for buying ambitions. Most of the time Chinese don’t even buy it by themselves due to a lack of time. If we think about switching costs in that segment, they are low. It’s hard to tie the customer, because the products JYSK sales are exchangeable without any switching costs and the possibilities will be even more in the future. As a result of that the bargaining power growths. Chinese are very open and well informed though very brand fixed, it is easier to tie them with a brand than a product. The consumers are very price sensitive, they want more for less. It’s important to consider national special features, ike not using some colors (yellow) because of their special meaning. Buyers want hard mattresses and because of the fast changing generations the trend of bed-linen and duvets will be change as well. Next I want to have a look at the suppliers. There is already a fierce competition going on at the local supplier market, mass production of less quality is floating the market. Way cheaper than JYSK products. The large number of manufacturers pushed the bargaining po wer of the Chinese furniture industry suppliers. Conclusion: Porter’s 5 Forces has shown that the Chinese furniture market is developing quite fast and changing all the time and due to this suffers from different circumstances (e. g. changing customer needs/ less raw materials). Focusing the micro-level it must be stated that the market is defined by intensive competition due to rivalry in conquering market shares. While entering the market is nothing in the way, companies must be rather careful to prevent plagiarism and stuck to what they are good at. Keep their focus on the brand and less at the variety of the products because the Chinese market offers every product already way cheaper.

Tuesday, November 26, 2019

How to Keep Your Business From Being Robbed

How to Keep Your Business From Being Robbed If you own a business, particularly one that deals in cash, there is a good chance that one day it may be robbed.  If you are lucky, the robbery will occur after the business is closed and all of your employees have gone home. If not, you, your employees and possibly your customers could be faced with a very dangerous situation. Safe Steps to Protect Your Business There are effective measures that business owners, managers, and employees can take that will protect the assets of the business and make it safer for employees.   Always have two or more employees open and close the business.Install an effective alarm system that is monitored.Use surveillance cameras behind the cash register and facing out to the front of the counter.Also, install surveillance cameras in areas where a person could hide.Keep the outside doors in backrooms locked when not in use.Have lockers or locked desks so employees can lock up any personal valuables, purses, or medications.Do not release personal information  about employees to strangers and shred all past employee records when trashing it.Keep a low cash balance in the cash registers.Make regular bank deposits of excess money or lock it in a safe.Vary the times and the routes used to go to the bank to make deposits.Avoid sending one person to the bank with a deposit.Avoid making deposits late at night.Do not carry the deposit openly in a deposit bag.Avoid hanging signs or putting displays on windows or around the sales counter that will obstruct the view of the register. In areas that are blocked by shelving, walls or other obstructions, hang concave mirrors. Do careful reference checks on employees that are hired.Have policies in place concerning employees friends or relatives hanging around the business.Customers should be greeted when they enter the business and train employees to make eye contact and engage with the customers. An alert staff can quickly deter a would-be robber.Train employees not to take risks, but to call the police if they see suspicious people inside or lurking outside of the business.If employees really suspect that they are about to be robbed, tell them to lock the doors of the business until police arrive.Keep your business well lit both inside and out and focus on areas where someone could hide.Trim trees and bushes so that they do not become hiding places for robbers by blocking light.Become friends with local police officers. Encourage them to stop by your business.If possible, use only one cash register at night. Leave the drawers on the other cash registers opened and tilt the money tray so that it will sho w that it is empty. Do not tempt robbers by balancing the cash register by the cash desk. Take it to a back office to count it.Train employees to be alert when handling money. It is easy to make a one dollar bill look like a twenty dollar bill to an employee that is not paying attention.Do not completely cover the windows of the business by closing blinds are pulling curtains at closing time. Always leave them only partially closed. What to Do If Your Business Is Robbed Always make personal safety the number one priority. Money and merchandise can be replaced. Train employees to comply with the robbers demands and to try to remain calm, move slowly, and communicate only when necessary. If employees are in other areas of the building, let the robber know so that they are not surprised by an employee who may come out of a backroom. When the robber leaves, employees should never follow after them, but instead lock the doors of the business, move to the back of the building and wait for the police to arrive. While they wait they can document what occurred, including the time the robbery took place, what was stolen and a description of the robber. It could be helpful that within a few days of the robbery, the employees who were present come for a meeting so that what happened can be discussed, emotions shared, and suggestions on what can be improved be accessed to help deter being robbed again.

Friday, November 22, 2019

How to Make a Cloud Chamber

How to Make a Cloud Chamber Although you cannot see it, background radiation is all around us. Natural (and harmless) sources of radiation include cosmic rays, radioactive decay from elements in rocks, and even radioactive decay from elements in living organisms. A cloud chamber is a simple device that allows us to see the passage of ionizing radiation. In other words, it allows for indirect observation of radiation. The device is also known as a Wilson cloud chamber, in honor of its inventor, Scottish physicist Charles Thomson Rees Wilson. Discoveries made using a cloud chamber and a related device called a bubble chamber led to the 1932 discovery of the positron, the 1936 discovery of the muon, and the 1947 discovery of the kaon. How a Cloud Chamber Works There are different types of cloud chambers. The diffusion-type cloud chamber is the easiest to construct. Basically, the device consists of a sealed container that is made warm on the top and cold on the bottom. The cloud inside the container is made of alcohol vapor (e.g., methanol, isopropyl alcohol). The warm top part of the chamber vaporizes the alcohol. The vapor cools as it falls and condenses on the cold bottom. The volume between the top and bottom is a cloud of supersaturated vapor. When an energetic charged particle (the radiation) passes through the vapor, it leaves an ionization trail. The alcohol and water molecules in the vapor are polar, so they are attracted to ionized particles. Because the vapor is supersaturated, when the molecules move closer, they condense into misty droplets that fall toward the bottom of the container. The path of the trail can be traced back to the origin of the radiation source. Make a Homemade Cloud Chamber Only a few simple materials are needed to construct a cloud chamber: Clear glass or plastic container with lid99% Isopropyl alcoholDry iceInsulated container (e.g., a foam cooler)Absorbent materialBlack paperVery bright flashlightSmall bowl of warm water A good container might be a large empty peanut butter jar. Isopropyl alcohol is available at most pharmacies as rubbing alcohol. Make sure its 99% alcohol. Methanol also works for this project, but it is much more toxic. The absorbent material could be a sponge or piece of felt. An LED flashlight works well for this project, but you can also use the flashlight on your smartphone. Youll also want your phone handy to take pictures of the tracks in the cloud chamber. Start by stuffing a piece of sponge into the bottom of the jar. You want a snug fit so it wont fall when the jar is inverted later on. If necessary, a bit of clay or gum can help stick the sponge to the jar. Avoid tape or glue, since the alcohol may dissolve it.Cut the black paper to cover the inside of the lid. Black paper eliminates reflection and is slightly absorbent. If the paper doesnt stay in place when the lid is sealed, stick it to the lid using clay or gum. Set the paper-lined lid aside for now.Pour isopropyl alcohol into the jar so that the sponge is completely saturated, but there isnt excess liquid. The easiest way to do this is to add alcohol until there is liquid and then pour the excess out.Seal the lid of the jar.In a room that can be made completely dark (e.g., a closet or bathroom without windows), pour dry ice into a cooler. Turn the jar upside down and place it lid-down onto the dry ice. Give the jar about 10 minutes to chill.Set a small dish of warm water on top of the cloud chamber (onto the bottom of the jar). The warm water heats the alcohol to form a cloud of vapor. Finally, turn off all the lights. Shine a flashlight through the side of the cloud chamber. Youll see visible tracks in the cloud as ionizing radiation enters and leaves the jar. Safety Considerations Even though isopropyl alcohol is safer than methanol, its still toxic if you drink it and its highly flammable. Keep it away from a heat source or open flame.Dry ice is cold enough to cause frostbite on contact. It should be handled using gloves. Also, dont store dry ice in a sealed container, as pressure build-up as the solid sublimates into gas can cause an explosion. Things to Try If you have a radioactive source, place it near the cloud chamber and see the effect of the increased radiation. Some everyday materials are radioactive, such as brazil nuts, bananas, clay kitty litter, and vaseline glass.A cloud chamber offers an excellent opportunity to test methods of shielding against radiation. Place different materials between your radioactive source and the cloud chamber. Examples might include a baggie of water, a piece of paper, your hand, and a sheet of metal. Which is best at shielding against radiation?Try applying a magnetic field to the cloud chamber. Positive and negative charged particles will curve in opposite directions in response to the field. Cloud Chamber Versus Bubble Chamber A bubble chamber is another type of radiation detector based on the same principle as the cloud chamber. The difference is that bubble chambers used superheated liquid rather than supersaturated vapor. A bubble chamber is made by filling a cylinder with a liquid just above its boiling point. The most common liquid is liquid hydrogen. Usually, a magnetic field is applied to the chamber so that ionizing radiation travels in a spiral path according to its speed and charge-to-mass ratio. Bubble chambers may be larger than cloud chambers and can be used to track more energetic particles.

Wednesday, November 20, 2019

Religious persecution internationally Research Paper

Religious persecution internationally - Research Paper Example persecution by governments. In Russia, cruel criteria and government monopoly against the Orthodox church has led to discrimination against some other churches and religions. Muslim women in Turkey also can not wear anything that reveals they are Muslims such as headscarves. There is another type of racism against Muslims in Burma that Muslims don’t have the right to get citizenship or passports. As a result, Muslims in Burma will lose their chance to get jobs. In Iran members of the Bahai faith are prevented pensions and government grants. In addition, Bahai students are not able to pursue their higher education in Iran’s schools. In order for some churches get their legal recognition in Serbia, they have to achieve various conditions. In contrast, some churches obtain their legal status without doing anything (Type). These are some examples of racism and religious persecution by the governments of different countries that seek to broadcast and promote persecution amon g their citizens either directly or by a particular group. arrests of members of the banned Falun Gong spiritual movement. The same thing also happens for both Buddhist and Christians in Vietnam. Muslims in America and Australia are subjected to multiple physical assaults and attacks for their property as mosques by burning. In addition, Muslims also in America and Australia are described by some as terrorists and some people there hate to speak with Muslims directly. In Saudi Arabia, only Muslims can practice their religion freely but if you are not Muslim, you will face a lot of trouble and contempt and you will not find place also to do your religious ritual. The government of Georgia has failed so far to bring and judge the perpetrators of the violence against worshippers of non-Orthodox faiths. In India also there are bloody conflicts between Muslims and Hindus, as both parties seek to be the dominant.

Tuesday, November 19, 2019

FINISH LINE Essay Example | Topics and Well Written Essays - 500 words

FINISH LINE - Essay Example Connick mentions that seasonal sales period is a high time for a store to make greater profits, but it comes with difficulties, as well. During the busy season, avoiding stock out is imperative. A seasonal stock should be carefully monitored on a daily basis and to avoid empty stock, the store manager must call the warehouse every day for that. Finish Line must take care of everyday pricing, assortment, space management, inventory management on a daily basis, and must show prowess in handling business decisions when it comes to seasonal products. There are many people complaining about wrong shoe size or the shoes that are outdated in fashion terms. There are researches, like the one mentioned by Better Health Channel (2013), that put high emphasis on foot care when it comes to running and jogging. So, the customers need the types of shoes that are not only in fashion but also take care of their feet. The buyers are the ones that have to face a lot of risk because even if Finish Line takes three months as its lead time, the other shoe making companies mentioned in the case study take at least six months. This means that customers have to wait for long to see what would be the changes in fashion in the offing. A new fashion is most likely to show up in six months. If the customer rates store A high in style-by-style ranking, store B lesser than that and store C the least in ranking then Finish Line would have to make decisions in keeping the inventory of store A available at all the time. The reason is very evident; if the customers have ranked according to style, then this means that they are fashion conscious and want to look up to date in shoe styling. This gives rise to the fact that the customers that ranked store A high in style would, most of the times, like to buy from store A. Straightforwardly, Finish Line would have to take special care of inventory management at store A. Considering this scenario

Saturday, November 16, 2019

Human learning and survival Essay Example for Free

Human learning and survival Essay There is a common belief that the ability to learn is what makes human survival possible. I believe that survival is not based solely on learning. Human survival especially in times of vast environmental change is the result of a combination of learning, logic, reasoning and subsequent application of knowledge. The thing that sets humankind apart from other living things is intellect, which according to the dictionary is the ability to learn and reason. Learning is simply the ability of animals (humans included) to acquire and retain new information. Whenever we try to learn a new dance step, learn a new language or simply remember the names of people we meet, we in fact use our learning faculties. So do animals when they figure out that scrounging around in garbage cans can reward them with food. Darwinian theory proposes the idea of evolution wherein living things adjust biologically, mentally and physiologically to environmental conditions and demands. When the concept of survival of the fittest and natural selection is discussed, it pertains to animals that are not just physically fit but mentally as well (Arrizza). In fact most biologists and anthropologists support this thinking by citing the example of how humans have always depended on their wits in order to survive. More often than not, it is the more dull-witted ones who perish even before they have given birth to offspring, which probably is a good thing for succeeding generations (Thorndike, 1931, p. 184). It was stunningly simple. Nature does what animal breeders do, but gradually, and over longer periods of time. In a species, those individuals who are best adapted in their hereditary endowment will succeed, and survive, better than their fellows. That is the struggle for existence. Those successful individuals will leave more offspring, and this will move the mode, the central tendency of the species, in their direction. Following generations will continue to undergo selection for still better adaptation: running, swimming, seeing, hiding, chewing, or all together. (Howells, 1993, p. 6) Supposing this theory was correct however, it would imply that the weak or learning challenged humans would have been weeded out a long time ago. The thing is that in todays times, learning challenged humans still exist and even thrive. There are some quarters that may opine that intelligence and the development of skill are products of mental evolution. Evolution refers to progress to something more functional, advanced and suited to the current environment (Human Evolution). The fashioning and use of primitive tools are just a few hallmarks of how human intelligence has evolved and applied learning into something that helped their survival. For all practical purposes, learning is often seen as an attempt to create a memory or store information that lasts as it is invariably linked with memory. Dr. Eric R. Kandle, vice chairman of the Dana Alliance for Brain Initiatives sums it as: Learning is how you acquire new information about the world, and memory is how you store that information over time (What is learning) Simply put, it is just the accumulation of facts and information. At this point it is important to point out the difference between learning and memory. Kandle points out that not all learning can get stored into long term memory. Such is the case of things a person learned in school. Unless these lessons are used in day to day life, many will have trouble remembering them some years after. Kandle adds that There is no memory without learning, but there is learning without memory. (What is learning) True learning cannot exist without memory but Thorndike (1911) scorns the idea that human learning is the same as real human intellect. He states that learning alone does not include the more complex processes of reasoning or inference. No real thought is given to the relationship and causality of things, neither is there an appreciation of the progress the application of learning is causing. He further posits that learning is based solely on factors that are present in the environment. It is human intellect that makes it possible for humans to think and develop further learning outside the box or beyond what are present in his environment. Rychlak (1994) supports this contention with his own theory of Logic Learning. Rychlak believes that learning is an inherent quality in both humans and animals alike. Humans however possess the power and capability of logic that enables them to make sense and assign purpose and function to information that is learned. (p. 35) Learning is not limited to humans. Every living organism has the capability to learn. It has been proven that animals including dogs, cats and even bees have information and skill acquiring capabilities. While most animal characteristics are arguably innate or instinctive like a newborn baby or puppys nipple searching and sucking reflex, many later skills are learned. What sets people apart is rather not limited to the capacity to learn and store information but rather in the processing of this information afterwards and figuring out what to do with it. Animal learning is mostly based on impulses and instinct. There are three different ways by which organisms learn: by trial and error, by observation and imitation, and by instruction. (Campbell, 1998, p. 39) Trial and error is by far the most common method of learning among living organisms. An example of this is when a mouse tries to figure its way out of a puzzle by trying out first one path, then another until it hits upon the correct path to follow. Observation and imitation is illustrated by how the young of animals and humans alike acquire learning by watching and imitating the actions of their parents. This is most commonly the basis of the development of behavioral patterns and actions. Finally, and what is arguably the method unique to humans is the method of instruction through language. Why is it unique? Instruction needs conscious thought and full intention of teaching. What is more is that instruction is a big factor in the propagation of a culture yet the topics and methods of instruction are also largely dependent on culture (p. 40). Language is also another important and distinctive part of both human culture, instruction and in effect, human learning (Alland, 1973, p. 209). Using language in instruction speeds up the learning process thereby allowing for more potential information to be learned and assimilated. Instructions and responses are direct and accurate. In the same way, a shared language serves both as a unifying element of culture and shared experience between individuals. Learning and Adaptation Enough mention has been made of adaptation with regard to human survival†¦what is adaptation? Adaptation is lexically defined as an adjustment to conditions present within an environment or a reaction to a persistent and present stimulus. It allows an organism to adapt or change components or behaviors within itself to match the demands of its environment. Survival is an organisms ability to exist and propagate in relation to its surroundings and environments. Is learning the key to adaptation and in effect human survival? No. But it is one of the fundamental and major contributors to it. Like most living organisms, humans have physical limitations that are challenged by natural elements and processes such as climate, hunger and other environmental conditions. Unlike other animals however, humans are relatively less sensitive and attuned to environmental changes (Piantadosi, 2003, p. 1). It is at this point that the human ability to learn, reason and compare their living conditions and determine problems that may exist and threaten their survival. Like people in modern days, primitive men had their environment with its own accompanying problems. If modern people today are challenged by more high tech issues like traffic, work, and finances, our primitive ancestors had to figure out ways of keeping warm in the winter and putting food on the table (or rock). There were challenges in how to hunt and capture prey effectively as well as make sure that they do not become prey to carnivorous predators of their time. From plain materials and tools fashioned with flint and animal bone, primitive humans graduated to working with copper which was more malleable yet as tough as stone, and then to the much stronger bronze which was formed by melting copper with tin and finally, iron (Hartman, 1996). Supporters of learning as the keystone of survival wold point this out as a way by which learning improved human existence. But basing on definitions alone, learning meant that they simply realized that stone is not so easy to work with, copper is malleable but pretty weak, and bronze and iron are harder metals. It is logic and reasoning that made it possible for them to realize that 1. ) there are problems with the materials they are using, 2. ) they need to find a better solution to their requirements, hence the search and formulation of copper and bronze. Without logic and reasoning people then would have simply stopped at knowing. One may look at this the same way as the differentiation between science and technology. Science is that wide and impressive body of knowledge which will remain meaningless unless applied and utilized in technology.

Thursday, November 14, 2019

Racism Today :: Racism Argumentative Race Essays

  Ã‚  Ã‚  Ã‚  Ã‚  Racism is one of the world’s major issues today. Many people are not aware of how much racism still exists in our schools workforces, and anywhere else where social lives are occurring. It is obvious that racism is bad as it was many decades ago but it sure has not gone away. Racism very much exists and it is about time that people need to start thinking about the instigations and solutions to this matter. Many people believe that it depends on if a person was brought into the world as a racist or not but that is not the case at all. In fact, an individual cannot be born a racist but only learn to become one as they grow from child to adulthood. Basic causes, mainstream, institutions, government, anti racism groups, and even some hidden events in Canada’s past are a few of the possible instigations and solutions to racism.   Ã‚  Ã‚  Ã‚  Ã‚  To begin with, frustration is a very common cause of racism. If one is having some sort of a social problem, they tend to get very angry with people who are not even concerned with their situation. For instance, when a person is having a tough time economically, they find it easy to blame immigrants for taking away their jobs or creating fewer opportunities (Abanes 1992,12-15). This type of an analysis is very easy to make but when one makes this assumption, it usually leads to hate towards any minority group. The psychological factor is also common disturbance that is found as the root of racism. People with tough childhood may sometimes produce anger and hate towards others (Hayes 1995, 4-5). This kind of person is inclined to dominate others as these qualities attract to racism because of the way racism divides the world into superior and inferior. In these types of situations, one can only picture of what might go through the heads of such individuals. However , in some cases aggravation is only created by the mental thought. Change is a particular device that people cannot handle at all times. People are more comfortable around the recognizable and they find it hard to adapt to a culture that they are not familiar being with. Since 1987, Chinese have been settling in Vancouver, as the suburb of Richmond went from one in twenty to one in three of its residents being Chinese, in two decades. This rapid change was not acceptable for many people who moved out for that very reason so they can live in a â€Å"white town† again (Rupet 1996,13-15).

Monday, November 11, 2019

To What Extent Does the Impact of World War I Explain the Outbreak of the Two Revolutions in 1917 ?

To what extent does the impact of World War I explain the outbreak of the two revolutions in 1917 ? To a certain extent, the First World War was a major contributing factor to the two revolutions that took place in 1917, the February and October Revolution. The war worsened the issues that already existed in Russia and also highlighted the lack of leadership shown by the Tsar and the Provisional Government set up after the February Revolution and also the Tsars military command over the army during the war. However, World War One was not the only reason for the revolutions taking place and acted as a tipping factor from the already undergoing social, political and economical problems plaguing Russia which led to the fall of the Tsar and the Provisional Government. The war was a massive mistake for Russia, it gained success support at first from the Russian public until they started to lose battles. After defeats in 1915 the poor attempt at retreating and the number of those wounded the high command and the Tsar were blamed which led to Nicholas II making one of his biggest mistakes ever whilst in his reign, Tsar Nicholas II took the advice of Grigori Rasputin, a peasant who was friends with the royal family from trying to heal their son of haemophilia, and went and led the Russian war effort. The tsar had a slender knowledge about war which led to him putting himself in a vulnerable position as he would now have to make all correct decisions or would be blamed by the people back home for any wrong decisions. Joe Gaucci, a historian, backs up this claim and states that the Tsars decision â€Å"proved disastrous as the government became increasingly chaotic†. Over 200,000 men were lost in the war and with 15 million peasants pulled from the farms the food shortage became a larger problem. The army started to lose faith in the Tsar, this was a vital for the revolution as they stopped shooting on the rioters and leading to the revolution continuing. The war also led to the downfall of the provisional government. After the Tsar leaving his role, the public called for peace and for Russia to leave the war. The provisional government tried to regain the support of the army and the Russian public by making the army launch the June offensive, with the July offensive in the first two weeks being able to exploit the poor morale of the Austrian Army were then pushed back because of soldiers refusing to obey order thus overriding the early success. After the Germans counter-attacked leaving thousands of soldiers deserted the army suffered a collapse. Not only did this show how poorly the Russian army was organised, equipped and mentally able to win the war but it also showed the Provisional Governments disregard of listening to the publics cries to stop the war. During the first revolution the political issues were a large factor for it to happen. With the Tsar leaving the country to command the army, the Tsarina was left in charge. This was a poor decision at first because the Tsarina was German and many people saw her as either a spy for Germany or having split allegiances so would make poor decisions and not consider what was best for Russia. The government became very unstable with the Tsarina in charge as she continually kept changing the ministers especially if they did not want to make decisions directed by the ‘Man of God’. On top of this the Tsarina took advice from a peasant called Rasputin, who was first Tsars Nicholas II’s sons doctor to try and cure his haemophilia. Rasputin was a advisor to the Tsarina and many speculated having an affair with her, while Tsarina was firing ministers he persuaded her to induct ministers, who were corrupt, into the high court. For the second revolution and the Provisional Government it was Lenin and the Bolsheviks who were the main political issue. Lenin knew the government was weak and published his ‘April theses’ which highlighted two areas ‘All power to the Soviets’ and ‘Peace, Bread, Land’ which also follows the saying ‘Bread and Circuses’ which is the common metaphor to explain the needs to keep the public of a country happy. After this in July the Bolsheviks supposedly were the brains behind the ‘July Days’ which almost lead to a revolution, instead it lead to the Provisional Government arresting main leaders of the Bolsheviks such as Trotsky, however the bolsheivik party was still allowed to run. The biggest provisional government mistake was during the Kornilov affair in which the bolsheivks were released from prison, given guns and told to fight, in the end they were not needed but were seen as the heroes of the day. The provisional Governments poor handling of the Bolsheiviks could also lead to someone believing that politics was the reason for the Revolutions. Both of the political factors for the revolutions breaking out could be attributed to World War I Economic Problems During both revolutions Russia was struggling with economic problems. The three main factors which affected the economy of Russia was the Inflation, Food shortages and the affect of industrialization in the cities. Inflation occurred mainly because of the Governments spending which increased by 400% between August 1914 and March 1917, this would have occurred because of the war but affected the people of Russia as inflation increased as they kept printing more money, taxes then slumped as sale of alcohol was banned which contributed a large sum of taxes as the government possessed a monopoly on the sale of vodka. When the war started in 1914 15 million peasants were called up to aid the war effort, this resulted in the agriculture sector becoming affected and eventually food shortages started in 1916, this affected the cities a considerable amount as transport was mainly used for supplying the army and everything they needed. With industrialization happening at the same time as the war, Petrograd and Moscow’s populations increased and resulted in overcrowding. Factories were hiring more people than they were before the war and many people were affected by the food shortages, the first signs of a revolution started in 1916 when one million workers went on strike. These economic problems can all be attributed to World War I breaking out. Why the war wasn’t a factor Some could argue that the World War was not the cause of the two revolutions. The Tsar had gained alot of support from the war at first and many believe they should work together to win the war but all of this came undone when he removed himself from Russia to join the army in the front line. It could also be argued that even though the war contributed to the Revolution the problems for the revolutions was there before the war and anything could have triggered the revolution. But its just so happened that poor decisions during the war lead to the revolution occurring. The first revolution could be the result of the poor political set up in Russia. With a Duma being granted by the Tsar after the 1905 Revolution. With the Duma being set up after the October manifesto it was useless as it had no power with the Tsar still being the main controller of the Duma. It could not do anything against the Tsar otherwise risking being shut down and even though it supposedly gave more power to the people in matter of fact the Tsar had the majority of control. conclusion In conclusion, even though there were factors such as social, economic and political within the country which varied between short and long term as well as foolish decisions made by Tsar Nicholas II and Kerensky leader of the provisional government. The world war was the cause of most of the problems and also was the cataylyst of tese problems making them worse. Because of this reasoning the World War should be considered as a large cause and factor for both October and February revolution of Russia in 1917.

Saturday, November 9, 2019

Opinions of the plans for Cuckmere Haven

The Cuckmere haven restoration project has received a lot of mixed opinions; some believe it is a great idea and will be sustainable in years to come, others disagree and believe it is a bad decision and will jeopardise the surrounding environment and some aren't bothered about what happens as it will not effect them. The majority of the people who disagree with the project are locals in the area and are concerned about the possible risk of flooding, damage to the vast wildlife in the area and also the beautiful estuary becoming an eyesore. It is understandable that the local residents are worried as the future management of the estuary will affect them, however, on the day we visited Cuckmere haven, only 8 of 34 people travelled less than 5miles to get there, from this I can see why many other people aren't concerned about the Cuckmere haven's future as they won't be affected by the changes being made, which was made clear on our questionnaire results, as shown below How will the scheme affect you? However, not all the local residents are against the plan as Grace Francis confirms stating, â€Å"We deserve to be fully protected – no-one warned us when we bought the house this would happen. I don't know how long we will be able to stay in this property.† Grace wishes for her home to be protected and believes the restoration project will ensure that her property remains safe and will not be affected by rising sea levels and flooding. Colin King – another local resident, believes that by carrying out the restoration project, the beauty of the estuary will be ruined. He claimed, â€Å"Nearly half a million people visit the Cuckmere valley each year. They marvel at the meandering river and will be disappointed to see mudflats.† People who feel strongly about protecting the environment are more likely to be against the scheme, as they believe it could be potentially dangerous for certain wildlife. Others, such as the Sussex Downs Conservation board, believe that the plan is a good option for protecting certain species as it involves connecting the cut-off meander back with the channel. They explained that, â€Å"the meanders do not function naturally and are gradually filling up with silt. In the summer of 2003, the hot weather resulted in the death of large numbers of flatfish, flounder and plaice because the shallow water heated up reducing the oxygen available for the fish to breathe in.† From our questionnaire results, I can see that majority of the people asked visited Cuckmere haven for the beautiful views and scenery, which will be dramatically changed by carrying out the restoration project. David Pearce, local retired resident, supports this argument, stating that, â€Å"this is an iconic place, an essential part of Sussex's identity. I oppose this proposal†. Overall there are a variety of opinions on whether or not the plan will be a success; the environment agency did consider these points and due to mass dispute, the plan was delayed in 2003.

Thursday, November 7, 2019

Notion of Human Rights essays

Notion of Human Rights essays Human rights are a product of a philosophical debate that has been argued since the beginning of mankind. Fueling this debate is the fact that many people have been unsatisfied with the notion that what is right or good is simply what a particular society or ruling elite feels is right or good at any given time. Great philosophers from the past such as Aristotle, Socrates and Thomas Aquinas focused extensively on their definition of human rights, among other ideas, and lead the way for more contemporary thinkers such as John Locke and Martin Luther King Jr. Notions of natural right were introduced by European philosophers such as Aristotle, but is was Aquinas who developed the idea more in-depth. In his Summa Theologica, he stated his belief that there were behaviors that were naturally right or wrong because God ordained it so. Aquinass theory was that God decided what limits should be placed on the human political activity. Centuries later, Thomas Hobbes offered a different view on the divine basis of natural right by describing a State of Nature in which God did not seem to play any role. Hobbes also referred to a natural right, rather than simply natural right. There was no longer just a list of behavior that was naturally right or wrong; Hobbes added that there could be some claim which was derived from nature. In Hobbes' view, this natural right was one of self-preservation. Further reinforcement of natural rights came with Immanuel Kant's writings that reacted to Hobbes' work. Kant argued that a state had to be organized through the imposition of, and obedience to, laws that appli...

Tuesday, November 5, 2019

How to Select a College Admissions Counselor

In light of the recent admissions scandal, there’s a pervasive belief that using a college admissions counselor is the purview of the rich and famous. However, the truth is that it’s not just actors and actresses who are soliciting the services of counselors. On the contrary, a large percentage of parents from all social strata are hiring private college consultants to assist their children on the college journey. It’s hard to say exactly how many students use the services of college counselors each year. According to a survey conducted by marketing firm Lipman Hearne, 26 percent of students who scored in the 70th percentile or higher on the SAT admitted to using a private college counselor. However, it’s possible that this number is significantly higher, and some students simply don’t feel comfortable admitting seeking help. While dishonest companies like Edge College & Career Network, the business at the center of the admissions scandal, are the exception rather than the rule, it pays to do your homework when selecting a college admissions counselor. Read on to discover what types of admissions counselors are out there, along with questions to ask potential consultants. It’s not just the wealthy who can benefit from college education counselors. On the contrary, these experts help a wide array of high school students gain admission to their dream colleges. In particular, the services are beneficial to those with specific or niche passions, such as athletics or musical theater. Additionally, college counselors can help students identify lesser-known schools that have strong programs in their chosen majors. College counselors also provide valuable services to families of students with learning disabilities and other educational challenges. Along with ensuring students have the appropriate amount of time for SAT and ACT testing, consultants can work with you to identify schools that offer the best and most supportive programs for your teen’s needs and goals. Parents seeking college admissions support for their teens can generally choose between two different options: IECs and consulting firms. Also known as independent educational consultants, IECs help students throughout the application process. Along with supporting students in identifying the best reach, target, and safety schools, they offer information on financial aid and scholarships and provide feedback on admissions essays. In most cases, parents drop their teens off at a local IEC’s office to discuss college admissions questions one on one. This in-person support can help both students and parents feel more confident in the process. However, it’s worth noting that most independent educational consultants work with a very limited group of students with similar profiles. As a result, they might not have the up-to-date information needed to support teens from different backgrounds, races, ethnicities, and religions. Estimating your chance of getting into a college is not easy in today’s competitive environment. Thankfully, with our state-of-the-art software and data, we can analyze your academic and extracurricular profile and estimate your chances. Our profile analysis tool can also help you identify the improvement you need to make to enter your dream school. Additionally, independent educational consultants tend to operate with little oversight. Without state or federal agencies looking over their shoulders, some IECs have resorted to less-than-honest practices. This was the case earlier in the month when the U.S. Attorney in the District of Massachusetts brought federal charges against 50 individuals for taking part in a conspiracy to help high schoolers get into elite colleges around the nation. On the other hand, college consulting firms tend to work with a larger group of students, allowing them to utilize the latest data to support a wide range of students from diverse backgrounds. At , we’ve worked with over 10,000 students online, meaning location isn’t a factor in securing aid and we’ve seen a breadth of profiles and decisions. Along with solving college fit issues, firms support teens in selecting the best high school coursework, choosing extracurriculars, and revising their college essays. While IECs mostly work with students who are ready to send out applications, consulting firms, like , know the college journey begins as early as freshman year of high school. So where do you start when choosing an IEC or college consulting firm? The best admissions counselors have prior experience working with students of various backgrounds and profiles.   Because college counseling remains unregulated, students and parents have to do some of their own legwork when choosing a firm. Here are some important questions to ask before selecting a college admissions counselor: Make sure the answer is no to the following: If the answer to either of the last two questions is yes, this company is best avoided. Additionally, teens and their parents should stay away from any firm that offers an acceptance guarantee. The truth is that no reputable admissions counselor can promise to get a student into a particular school, and those who claim to do so may be using unfair, dishonest, or illegal tactics. At , we understand that not every student has access to private school admissions counselors who can walk them through the college application process. With that in mind, we created a program specifically to answer students’ questions about college admissions and help them build robust applicant portfolios. We’ve worked with over 10,000 students and are able to leverage data across all types of profiles and schools. You can meet with us from anywhere. We’re up to date on what is happening in admissions right now at hundreds of schools. We can help you understand your best fit colleges and how to maximize financial aid using data! Whether your goal is to determine which schools to target or boost financial aid, we can help you achieve your goals. To schedule an appointment with our team, call today or contact our College Applications Program online .

Saturday, November 2, 2019

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL ENGINEERING FOR CYBER ATTACKS - Essay Example In their actions, hackers in the contemporary society use the most sophisticated of malware to attack information systems and networks in ways never seen before. Nevertheless, the initial role of social engineering in these attacks is core and cannot be overlooked due to the technologies used. Social engineering is hackers’ equivalent of a con or a trick, which makes the target people or systems to think someone, something or an action, is safe, trustworthy and familiar while in reality it is not (Kiountouzis & Kokolakis, 2011). The most common of social engineering con tricks often involve the hacker sending an e-mail to the target person or system. This e-mail if first tailored so that it appears to have come from a trustworthy sender. However, these con e-mails often contain links that when opened or clicked, directs a computer to a malware, which is in turn downloaded by the user on the target computer or system (Kiountouzis & Kokolakis, 2011). At this stage, the hacker em ploys the Remote Access Tool (RAT) to search through the computer network and/or infect other computers or networks. Social engineering is today exploited by hackers to bring down or access others’ computer/information networks and obtain information in the comfort of their homes provided they are sure their target will most likely be sitting at their computers (Kiountouzis & Kokolakis, 2011). ... This paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, particularly those originating from hackers’ using social engineering. In this regard, the paper is a case study of an information security breach at one of the most renown IT security firms in the United States, the RSA. After addressing how RSA responded to the breach, the paper explores the role of employee alertness in averting such threats in the future. However, it is of the essence to first have a general understanding of the various techniques that hackers use to breach information security systems and obtain information illegally. The Protection Motivation Theory This paper will employ the protection motivation theory to explain the role and importance of employee alertness in assisting IS firms in detecting and preventing security breaches via social engineering techni ques. According to this theory employees will always protect themselves based on certain core factors. These factors include but are not limited to the probability of the occurrence of a security threat or breach, the suspected or expected severity of the threat, the vulnerability of the possible victims, the efficacy of the response/preventive mechanisms or behaviours. The motivation to protect oneself and property emanates from the evaluation of threats as well as the ability to cope with the threats or its effects. In the threat assessment context, employees of IS and IT companies are expected to be able to appraise the severity of possible social engineering threats and the seriousness of the situation once it occurs. On the other hand, the coping

Thursday, October 31, 2019

Macro Economics Essay Example | Topics and Well Written Essays - 500 words - 7

Macro Economics - Essay Example The increase in oil prices has led to the increase in production cost in these industries. Since Sweden is a big importer of oil, this increase will lead to a decrease in output and an increase in the rate of inflation. Since an increase in inflation rate reduces the level of unemployment, this increase in oil prices will also lead to a reduction in unemployment. The increase in oil prices cause capital input to reduce since it has become expensive to operate machinery and hence a decrease in the marginal product if labor. This will cause the short run and long run aggregate supply curves to shift leftwards. Since the increase does not affect the demand side components, the AD curve will not move. The nominal wages and prices will rise from a low point to a high point. The rise in price level will lead to a decrease in the real money supply. It will also lead to a rise in interest rates from a lower rate to a higher rate. This is a reduction in the investment factor aggregate demand. The consumption factor also decreases despite the government expenditure not changing. The shock caused by the supply side is similar to that caused by the demand side, the main difference being that it causes inflation and deflation1. In cases where the country would want to treat the shock caused by the supply side as it treats that caused by the demand side b y trying to stimulate the economy by using monetary or fiscal policies to shift the aggregate demand curve it will not succeed. This is because the nominal wages are only sticky downwards and attempting that would cause the inflation to increase further making the economy to deteriorate. In the short run, the aggregate supply curve will move to the left from short run AS1 to short run AS2. The intersection between the short run AS2 and AD 1 moves upwards towards the left. At to a higher point .At this high point, output decreases, and the price level increases. This forms short run

Tuesday, October 29, 2019

Auditing Essay Example | Topics and Well Written Essays - 750 words - 6

Auditing - Essay Example It has been noticed that frauds related to theft of inventory have a direct impact on the income statement of the company. Loss due to theft is directly proportion to decrease in profit (Week, 4 2012). There are following ways Mr. Franklin can reduce the probability of risk through theft. Access Control is like security measures these measures are taken so we can prohibit any kind of unauthorized entry in some restricted area (Audit Risk Assessment, Page 31), by this risk of theft of any asset can be reduced to a minimal level if the access is restricted to a minimal level then there is less probability of any kind of fraud or misrepresentation e.g. If there is only one person who is managing all cash related affairs and he is the only authorized person who have access to cash so, in such a scenario, the probability of theft will be low. It is necessary to count the assets periodically and then compare it with our records (Audit Risk Assessment, Page 381). It is quite essential to safeguard our assets from theft. It can provide you detail if there is some sort of difference between counted assets and recorded assets then we need an explanation. For that reason, first of all we need to understand the concept of materiality and we have to understand which category of goods is valuable to us (Week, 5 2012). It is a concept in which we use more than one person to complete a task; it means that we have to include different personal to execute a single transaction (Audit Risk Assessment, Page 380) so work of one individual is being cross checked by another individual. In such setup, there is a possibility that the risk of theft will reduce. But we have to make sure that no one is performing any duty which is mismatched. It is quite a good way for an internal control. The other risk the hospitality industry was exposed to a risk of fiddles or

Sunday, October 27, 2019

Factors Affecting Web Applications Maintenance

Factors Affecting Web Applications Maintenance Chapter 1 1.1 Introduction Software engineering [PRE01] is the process associated with industrial quality software development, the methods used to analyze, design test computer Software, the management techniques associated with the control monitoring of Software projects the tools used to support process, methods, techniques. In Software Development Life Cycle, the focus is on the activities like feasibility study, requirement analysis, design, coding, testing, maintenance. Feasibility study involves the issues like technical/economical/ behavioral feasibility of project. Requirement analysis [DAV93] emphasizes on identifying the needs of the system producing the Software Requirements Specification document (SRS), [JAL04] that describes all data, functional behavioral requirements, constraints, validation requirements for Software. Software Design is to plan a solution of the problem specified by the SRS document, a step in moving from the problem domain to the solution domain. The output of this phase is the design document. Coding is to translate the design of the system into code in a programming language. Testing is the process to detect defects minimize the risk associated with the residual defects. The activities carried out after the delivery of the software comprises the maintenance phase. 1.2 Evolution of Software Testing Discipline The effective functioning of modern systems depends on our ability to produce software in a cost-effective way. The term software engineering was first used at a 1968 NATO workshop in West Germany. It focused on the growing software crisis. Thus we see that the software crisis on quality, reliability, high costs etc. started way back when most of todays software testers were not even born. The attitude towards Software Testing [BEI90] underwent a major positive change in the recent years. In the 1950s when Machine languages were used, testing was nothing but debugging. When in the 1960s, compilers were developed, testing started to be considered a separate activity from debugging. In the 1970s when the software engineering concepts were introduced, software testing began to evolve as a technical discipline. Over the last two decades there has been an increased focus on better, faster and cost-effective software. Also there has been a growing interest in software safety, protection and security and hence an increased acceptance of testing as a technical discipline and also a career choice. Now to answer, What is Testing? we can go by the famous definition of Myers [MYE79], which says, Testing is the process of executing a program with the intent of finding errors. According to Humphrey, software testing is defined as, the execution of a program to find its faults. Testing is the process to prove that the software works correctly [PRA06]. Software testing is a crucial aspect of the software life cycle. In some form or the other it is present at each phase of (any) software development or maintenance model. The importance of software testing and its impact on software cannot be underestimated. Software testing is a fundamental component of software quality assurance and represents a review of specification, design and coding. The greater visibility of software systems and the cost associated with software failure are motivating factors for planning, through testing. It is not uncommon for a software organization to spend 40-50% of its effort on testing. During testing, the software engineering produces a series of test cases that are used to rip apart the software they have produced. Testing is the one step in the software process that can be seen by the developer as destructive instead of constructive. Software engineers are typically constructive people and testing requires them to overcome preconceived concepts of correctness and deal with conflicts when errors are identified. A successful test is one that finds a defect. This sounds simple enough, but there is much to consider when we want to do software testing. Besides finding faults, we may also be interested in testing performance, safety, fault-tolerance or security. Testing often becomes a question of economics. For projects of a large size, more testing will usually reveal more bugs. The question then becomes when to stop testing, and what is an acceptable level of bugs. This is the question of good enough software. Testing is the process of verifying that a product meets all requirements. A test is never complete. When testing software the goal should never be a product completely free from defects, because its impossible. According to Peter Nielsen, The average is 16 faults per 1000 lines of code when the programmer has tested his code and it is believed to be correct. When looking at a larger project, there are millions of lines of code, which makes it impossible to find all present faults. Far too often products are released on the market with poor quality. Errors are often uncovered by users, and in that stage the cost of removing errors is large in amount. 1.3 Objectives of Testing Glen Myers [MYE79] states a number of rules that can serve well as testing objectives: Testing is a process of executing a program with the intent of finding an error. A good test is one that has a high probability of finding an as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error. The objective is to design tests that systematically uncover different classes of errors do so with a minimum amount of time effort. Secondary benefits include Demonstrate that Software functions appear to be working according to specification. That performance requirements appear to have been met. Data collected during testing provides a good indication of Software reliability some indication of Software quality. Testing cannot show the absence of defects, it can only show that Software defects are present. 1.4 Software Testing Its Relation with Software Life Cycle Software testing should be thought of as an integral part of the Software process an activity that must be carried out throughout the life cycle. Each phase in the Software lifecycle has a clearly different end product such as the Software requirements specification (SRS) documentation, program unit design program unit code. Each end product can be checked for conformance with a previous phase against the original requirements. Thus, errors can be detected at each phase of development. Validation Verification should occur throughout the Software lifecycle. Verification is the process of evaluating each phase end product to ensure consistency with the end product of the previous phase. Validation is the process of testing Software, or a specification, to ensure that it matches user requirements. Software testing is that part of validation verification associated with evaluating analysing program code. It is one of the two most expensive stages within the Software lifecycle, the other being maintenance. Software testing of a product begins after the development of the program units continues until the product is obsolete. Testing fixing can be done at any stage in the life cycle. However, the cost of finding fixing errors increases dramatically as development progresses. Changing a Requirements document during the first review is inexpensive. It costs more when requirements change after the code has been written: the code must be rewritten. Bug fixes are much cheaper when programmers find their own errors. Fixing an error before releasing a program is much cheaper than sending new disks, or even a technician to each customers site to fix it later. It is illustrated in Figure 1.1. The types of testing required during several phases of Software lifecycle are described below: Requirements Requirements must be reviewed with the client; rapid prototyping can refine requirements accommodate changing requirements. Specification The specifications document must be checked for feasibility, traceability, completeness, absence of contradictions ambiguities. Specification reviews (walkthroughs or inspections) are especially effective. Design Design reviews are similar to specification reviews, but more technical. The design must be checked for logic faults, interface faults, lack of exception handling, non-conformance to specifications. Implementation Code modules are informally tested by the programmer while they are being implemented (desk checking). Thereafter, formal testing of modules is done methodically by a testing team. This formal testing can include non-execution-based methods (code inspections walkthroughs) execution-based methods (black-box testing, white-box testing). Integration Integration testing is performed to ensure that the modules combine together correctly to achieve a product that meets its specifications. Particular care must be given to the interfaces between modules. The appropriate order of combination must be determined as top-down, bottom-up, or a combination thereof. Product Testing The functionality of the product as a whole is checked against its specifications. Test cases are derived directly from the specifications document. The product is also tested for robustness (error-handling capabilities stress tests). All source code documentation are checked for completeness consistency. Acceptance Testing The Software is delivered to the client, who tests the Software on the actual h/w, using actual data instead of test data. A product cannot be considered to satisfy its specifications until it has passed an acceptance test. Commercial off-the-shelf (or shrink-wrapped) Software usually undergoes alpha beta testing as a form of acceptance test. Maintenance Modified versions of the original product must be tested to ensure that changes have been correctly implemented. Also, the product must be tested against previous test cases to ensure that no inadvertent changes have been introduced. This latter consideration is termed regression testing. Software Process Management The Software process management plan must undergo scrutiny. It is especially important that cost duration estimates be checked thoroughly. If left unchecked, errors can propagate through the development lifecycle amplify in number cost. The cost of detecting fixing an error is well documented is known to be more costly as the system develops. An error found during the operation phase is the most costly to fix. 1.5 Principles of Software Testing Software testing is an extremely creative intellectually challenging task. The following are some important principles [DAV95] that should be kept in mind while carrying Software testing [PRE01] [SUM02]: Testing should be based on user requirements: This is in order to uncover any defects that might cause the program or system to fail to meet the clients requirements. Testing time resources are limited: Avoid redundant tests. It is impossible to test everything: Exhaustive tests of all possible scenarios are impossible, because of the many different variables affecting the system the number of paths a program flow might take. Use effective resources to test: This represents use of the most suitable tools, procedures individuals to conduct the tests. Only those tools should be used by the test team that they are confident familiar with. Testing procedures should be clearly defined. Testing personnel may be a technical group of people independent of the developers. Test planning should be done early: This is because test planning can begin independently of coding as soon as the client requirements are set. Test for invalid unexpected input conditions as well as valid conditions: The program should generate correct messages when an invalid test is encountered should generate correct results when the test is valid. The probability of the existence of more errors in a module or group of modules is directly proportional to the number of errors already found. Testing should begin at the module: The focus of testing should be concentrated on the smallest programming units first then expand to other parts of the system. Testing must be done by an independent party: Testing should not be performed by the person or team that developed the Software since they tend to defend the correctness of the program. Assign best personnel to the task: Because testing requires high creativity responsibility only the best personnel must be assigned to design, implement, analyze test cases, test data test results. Testing should not be planned under the implicit assumption that no errors will be found. Testing is the process of executing Software with the intention of finding errors. Keep Software static during test: The program must not be modified during the implementation of the set of designed test cases. Document test cases test results. Provide expected test results if possible: A necessary part of test documentation is the specification of expected results, even though it is impractical. 1.6 Software Testability Its Characteristics Testability is the ability of Software (or program) with which it can easily be tested [PRE01] [SUM02]. The following are some key characteristics of testability: The better it works, the more efficient is testing process. What you see is what you test (WYSIWYT). The better it is controlled, the more we can automate or optimize the testing process. By controlling the scope of testing we can isolate problems perform smarter retesting. The less there is to test, the more quickly we can test it. The fewer the changes, the fewer the disruptions to testing. The more information we have, the smarter we will test. 1.7 Stages in Software Testing Process Except for small programs, systems should not be tested as a single unit. Large systems are built out of sub-systems, which are built out of modules that are composed of procedures functions. The testing process should therefore proceed in stages where testing is carried out incrementally in conjunction with system implementation. The most widely used testing process consists of five stages that are illustrated in Table 1.1. Errors in program components, say may come to light at a later stage of the testing process. The process is therefore an iterative one with information being fed back from later stages to earlier parts of the process. The iterative testing process is illustrated in Figure 1.2 and described below: Unit Testing: Unit testing is code-oriented testing. Individual components are tested to ensure that they operate correctly. Each component is tested independently, without other system components. Module Testing: A module is a collection of dependent components such as an object class, an abstract data type or some looser collection of procedures functions. A module encapsulates related components so it can be tested without other system modules. Sub-system (Integration) Testing: This phase involves testing collections of modules, which have been integrated into sub-systems. It is a design-oriented testing is also known as integration testing. Sub-systems may be independently designed implemented. The most common problems, which arise in large Software systems, are sub-systems interface mismatches. The sub-system test process should therefore concentrate on the detection of interface errors by rigorously exercising these interfaces. System Testing: The sub-systems are integrated to make up the entire system. The testing process is concerned with finding errors that result from unanticipated interactions between sub-systems system components. It is also concerned with validating that the system meets its functional non-functional requirements. Acceptance Testing: This is the final stage in the testing process before the system is accepted for operational use. The system is tested with data supplied by the system client rather than simulated test data. Acceptance testing may reveal errors omissions in the systems requirements definition (user-oriented) because real data exercises the system in different ways from the test data. Acceptance testing may also reveal requirement problems where the system facilities do not really meet the users needs (functional) or the system performance (non-functional) is unacceptable. 1.8 The V-model of Testing To test an entire software system, tests on different levels are performed. The V model [FEW99], shown in figure 1.3, illustrates the hierarchy of tests usually performed in software development projects. The left part of the V represents the documentation of an application, which are the Requirement specification, the Functional specification, System design, the Unit design. Code is written to fulfill the requirements in these specifications, as illustrated in the bottom of the V. The right part of the V represents the test activities that are performed during development to ensure that an application corresponding to its requirements. Unit tests are used to test that all functions and methods in a module are working as intended. When the modules have been tested, they are combined and integration tests are used to test that they work together as a group. The unit- and integration test complement the system test. System testing is done on a complete system to validate that it corresponds to the system specification. A system test includes checking if all functional and all non-functional requirements have been met. Unit, integration and system tests are developer focused, while acceptance tests are customer focused. Acceptance testing checks that the system contains the functionality requested by the customer, in the Requirement specification. Customers are usually responsible for the acceptance tests since they are the only persons qualified to make the judgment of approval. The purpose of the acceptance tests is that after they are preformed, the customer knows which parts of the Requirement specification the system satisfies. 1.9 The Testing Techniques To perform these types of testing, there are three widely used testing techniques. The above said testing types are performed based on the following testing techniques: Black-Box testing technique Black box testing (Figure 1.4) is concerned only with testing the specification. It cannot guarantee that the complete specification has been implemented. Thus black box testing is testing against the specification and will discover faultsofomission, indicating that part of the specification has not been fulfilled. It is used for testing based solely on analysis of requirements (specification, user documentation). In Black box testing, test cases are designed using only the functional specification of the software i.e without any knowledge of the internal structure of the software. For this reason, black-box testing is also known as functional testing. Black box tests are performed to assess how well a program meets its requirements, looking for missing or incorrect functionality. Functional testing typically exercise code with valid or nearly valid input for which the expected output is known. This includes concepts such as boundary values. Performance tests evaluate response time, memory usage, throughput, device utilization, and execution time. Stress tests push the system to or beyond its specified limits to evaluate its robustness and error handling capabilities. Reliability tests monitor system response to represent user input, counting failures over time to measure or certify reliability. Black box Testing refers to analyzing a running program by probing it with various inputs. This kind of testing requires only a running program and does not make use of source code testing of any kind. In the security paradigm, malicious input can be supplied to the program in an effort to cause it to break. If the program breaks during a particular test, then a security problem may have been discovered. Black box testing is possible even without access to binary code. That is, a program can be tested remotely over a network. All that is required is a program running somewhere that is accepting input. If the tester can supply input that the program consumes (and can observe the effect of the test), then black box testing is possible. This is one reason that real attackers often resort to black box techniques. Black box testing is not an alternative to white box techniques. It is a complementary approach that is likely to uncover a different type of errors that the white box approaches. Black box testing tries to find errors in the following categories: Incorrect or missing functions Interface errors Errors in data structures or external database access Performance errors, and Initialization and termination errors. By applying black box approaches we produce a set of test cases that fulfill requirements: Test cases that reduce the number of test cases to achieve reasonable testing Test cases that tell us something about the presence or absence of classes of errors. The methodologies used for black box testing have been discussed below: 1.9.1.1 Equivalent Partitioning Equivalence partitioning is a black box testing approach that splits the input domain of a program into classes of data from which test cases can be produced. An ideal test case uncovers a class of errors that may otherwise before the error is detected. Equivalence partitioning tries to outline a test case that identifies classes of errors. Test case design for equivalent partitioning is founded on an evaluation of equivalence classes for an input condition [BEI95]. An equivalence class depicts a set of valid or invalid states for the input condition. Equivalence classes can be defined based on the following [PRE01]: If an input condition specifies a range, one valid and two invalid equivalence classes are defined. If an input condition needs a specific value, one valid and two invalid equivalence classes are defined. If an input condition specifies a member of a set, one valid and one invalid equivalence class is defined. If an input condition is Boolean, one valid and invalid class is outlined. 1.9.1.2 Boundary Value Analysis A great many errors happen at the boundaries of the input domain and for this reason boundary value analysis was developed. Boundary value analysis is test case design approach that complements equivalence partitioning. BVA produces test cases from the output domain also [MYE79]. Guidelines for BVA are close to those for equivalence partitioning [PRE01]: If an input condition specifies a range bounded by values a and b, test cases should be produced with values a and b, just above and just below a and b, respectively. If an input condition specifies various values, test cases should be produced to exercise the minimum and maximum numbers. Apply guidelines above to output conditions. If internal program data structures have prescribed boundaries, produce test cases to exercise that data structure at its boundary. White-Box testing technique White box testing (Figure 1.5) is testing against the implementation as it is based on analysis of internal logic (design, code etc.) and will discover faultsofcommission, indicating that part of the implementation is faulty. Designing white-box test cases requires thorough knowledge of the internal structure of software, and therefore the white-box testing is also called the structural testing. White box testing is performed to reveal problems with the internal structure of a program. A common goal of white-box testing is to ensure a test case exercises every path through a program. A fundamental strength that all white box testing strategies share is that the entire software implementation is taken into account during testing, which facilitates error detection even when the software specification is vague or incomplete. The effectiveness or thoroughness of white-box testing is commonly expressed in terms of test or code coverage metrics, which measure the fraction of code exercised by test cases. White box Testing involves analyzing and understanding source code. Sometimes only binary code is available, but if you decompile a binary to get source code and then study the code, this can be considered a kind of white box testing as well. White box testing is typically very effective in finding programming errors and implementation errors in software. In some cases this activity amounts to pattern matching and can even be automated with a static analyzer. White box testing is a test case design approach that employs the control architecture of the procedural design to produce test cases. Using white box testing approaches, the software engineering can produce test cases that: Guarantee that all independent paths in a module have been exercised at least once Exercise all logical decisions Execute all loops at their boundaries and in their operational bounds Exercise internal data structures to maintain their validity. There are several methodologies used for white box testing. We discuss some important ones below. 1.9.2.1 Statement Coverage The statement coverage methodology aims to design test cases so as to force the executions of every statement in a program at least once. The principal idea governing the statement coverage methodology is that unless a statement is executed, we have way of determining if an error existed in that statement. In other words, the statement coverage criterion [RAP85] is based on the observation that an error existing in one part of a program cannot be discovered if the part of the program containing the error and generating the failure is not executed. However, executed a statement once and that too for just one input value and observing that it behaves properly for that input value is no guarantee that it will behave correctly for all inputs. 1.9.2.2 Branch Coverage In branch coverage testing, test cases are designed such that the different branch conditions are given true and false values in turn. It is obvious that branch testing guarantees statement coverage and thus is a stronger testing criterion than the statement coverage testing [RAP85]. 1.9.2.3 Path Coverage The path coverage based testing strategy requires designing test cases such that all linearly independents paths in the program are executed at least once. A linearly independent path is defined in terms of the control flow graph (CFG) of the program. 1.9.2.4 Loop testing Loops are very important constructs for generally all the algorithms. Loop testing is a white box testing technique. It focuses exclusively on the validity of loop constructs. Simple loop, concatenated loop, nested loop, and unstructured loop are four different types of loops [BEI90] as shown in figure 1.6. Simple Loop: The following set of tests should be applied to simple loop where n is the maximum number of allowable passes thru the loop: Skip the loop entirely. Only one pass thru the loop. Two passes thru the loop. M passes thru the loop where m N-1, n, n+1 passes thru the loop. Nested Loop: Beizer [BEI90] approach to the nested loop Start at the innermost loop. Set all other loops to minimum value. Conduct the simple loop test for the innermost loop while holding the outer loops at their minimum iteration parameter value. Work outward, conducting tests for next loop, but keeping all other outer loops at minimum values and other nested loops to typical values. Continue until all loops have been tested. Concatenated loops: These can be tested using the approach of simple loops if each loop is independent of other. However, if the loop counter of loop 1 is used as the initial value for loop 2 then approach of nested loop is to be used. Unstructured loop: This class of loops should be redesigned to reflect the use of the structured programming constructs. 1.9.2.5 McCabes Cyclomatic Complexity The McCabes Cyclomatic Complexity [MCC76] of a program defines the number of independent paths in a program. Given a control flow Graph G of a program, the McCabes Cyclomatic Complexity V(G) can be computed as: V(G)=E-N+2 Where E is the number of edges in the control flow graph and N is the number of nodes of the control flow graph. The cyclomatic complexity value of a program defines the number of independent paths in the basis set of the program and provides a lower bound for the number of test cases that must be conducted to ensure that all statements have been executed at least once. Knowing the number of test cases required does not make it easy to derive the test cases, it only gives an indication of the minimum number of test cases required. The following is the sequences of steps that need to be undertaken for deriving the path coverage based test case of a program. Draw the CFG. Calculate Cyclomatic Complexity V(G). Calculate the basis set of linearly independent paths. Prepare a test case that will force execution of each path in the basis set. 1.9.2.6 Data Flow based Testing The data flow testing method chooses test paths of a program based on the locations of definitions and uses of variables in the program. Various data flow testing approaches have been examined [FRA88] [NTA88] [FRA93]. For data flow testing each statement in program is allocated a unique statement number and that each function does not alter its parameters or global variables. For a statement with S as its statement number, DEF(S) = {X| statement S contains a definition of X} USE(S) = {X| statement S contains a use of X} If statement S is if or loop statement, its DEF set is left empty and its USE set is founded on the condition of statement S. The definition of a variable X at statement S is live at statement S, if there exists a path from statement S to S which does not contain any condition of X. A definition-use chain (or DU chain) of variable X is of the type [X,S,S] where S and S are statement numbers, X is in DEF(S), USE(S), and the definition of X in statement S is live at statement S. One basic data flow testing strategy is that each DU chain be covered at least once. Data flow testing strategies are helpful for choosing test paths of a program including nested if and loop statements 1.9.3 Grey-Box testing technique Grey box testing [BIN99] designs test cases using both responsibility-based (black box) and implementation-based (white box) approaches. To completely test a web application one needs to combine the two approaches, White-box and Black-box testing. It is used for testing of Web based applications. The Gray-box testing approach takes into account all components ma Factors Affecting Web Applications Maintenance Factors Affecting Web Applications Maintenance Chapter 1 1.1 Introduction Software engineering [PRE01] is the process associated with industrial quality software development, the methods used to analyze, design test computer Software, the management techniques associated with the control monitoring of Software projects the tools used to support process, methods, techniques. In Software Development Life Cycle, the focus is on the activities like feasibility study, requirement analysis, design, coding, testing, maintenance. Feasibility study involves the issues like technical/economical/ behavioral feasibility of project. Requirement analysis [DAV93] emphasizes on identifying the needs of the system producing the Software Requirements Specification document (SRS), [JAL04] that describes all data, functional behavioral requirements, constraints, validation requirements for Software. Software Design is to plan a solution of the problem specified by the SRS document, a step in moving from the problem domain to the solution domain. The output of this phase is the design document. Coding is to translate the design of the system into code in a programming language. Testing is the process to detect defects minimize the risk associated with the residual defects. The activities carried out after the delivery of the software comprises the maintenance phase. 1.2 Evolution of Software Testing Discipline The effective functioning of modern systems depends on our ability to produce software in a cost-effective way. The term software engineering was first used at a 1968 NATO workshop in West Germany. It focused on the growing software crisis. Thus we see that the software crisis on quality, reliability, high costs etc. started way back when most of todays software testers were not even born. The attitude towards Software Testing [BEI90] underwent a major positive change in the recent years. In the 1950s when Machine languages were used, testing was nothing but debugging. When in the 1960s, compilers were developed, testing started to be considered a separate activity from debugging. In the 1970s when the software engineering concepts were introduced, software testing began to evolve as a technical discipline. Over the last two decades there has been an increased focus on better, faster and cost-effective software. Also there has been a growing interest in software safety, protection and security and hence an increased acceptance of testing as a technical discipline and also a career choice. Now to answer, What is Testing? we can go by the famous definition of Myers [MYE79], which says, Testing is the process of executing a program with the intent of finding errors. According to Humphrey, software testing is defined as, the execution of a program to find its faults. Testing is the process to prove that the software works correctly [PRA06]. Software testing is a crucial aspect of the software life cycle. In some form or the other it is present at each phase of (any) software development or maintenance model. The importance of software testing and its impact on software cannot be underestimated. Software testing is a fundamental component of software quality assurance and represents a review of specification, design and coding. The greater visibility of software systems and the cost associated with software failure are motivating factors for planning, through testing. It is not uncommon for a software organization to spend 40-50% of its effort on testing. During testing, the software engineering produces a series of test cases that are used to rip apart the software they have produced. Testing is the one step in the software process that can be seen by the developer as destructive instead of constructive. Software engineers are typically constructive people and testing requires them to overcome preconceived concepts of correctness and deal with conflicts when errors are identified. A successful test is one that finds a defect. This sounds simple enough, but there is much to consider when we want to do software testing. Besides finding faults, we may also be interested in testing performance, safety, fault-tolerance or security. Testing often becomes a question of economics. For projects of a large size, more testing will usually reveal more bugs. The question then becomes when to stop testing, and what is an acceptable level of bugs. This is the question of good enough software. Testing is the process of verifying that a product meets all requirements. A test is never complete. When testing software the goal should never be a product completely free from defects, because its impossible. According to Peter Nielsen, The average is 16 faults per 1000 lines of code when the programmer has tested his code and it is believed to be correct. When looking at a larger project, there are millions of lines of code, which makes it impossible to find all present faults. Far too often products are released on the market with poor quality. Errors are often uncovered by users, and in that stage the cost of removing errors is large in amount. 1.3 Objectives of Testing Glen Myers [MYE79] states a number of rules that can serve well as testing objectives: Testing is a process of executing a program with the intent of finding an error. A good test is one that has a high probability of finding an as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error. The objective is to design tests that systematically uncover different classes of errors do so with a minimum amount of time effort. Secondary benefits include Demonstrate that Software functions appear to be working according to specification. That performance requirements appear to have been met. Data collected during testing provides a good indication of Software reliability some indication of Software quality. Testing cannot show the absence of defects, it can only show that Software defects are present. 1.4 Software Testing Its Relation with Software Life Cycle Software testing should be thought of as an integral part of the Software process an activity that must be carried out throughout the life cycle. Each phase in the Software lifecycle has a clearly different end product such as the Software requirements specification (SRS) documentation, program unit design program unit code. Each end product can be checked for conformance with a previous phase against the original requirements. Thus, errors can be detected at each phase of development. Validation Verification should occur throughout the Software lifecycle. Verification is the process of evaluating each phase end product to ensure consistency with the end product of the previous phase. Validation is the process of testing Software, or a specification, to ensure that it matches user requirements. Software testing is that part of validation verification associated with evaluating analysing program code. It is one of the two most expensive stages within the Software lifecycle, the other being maintenance. Software testing of a product begins after the development of the program units continues until the product is obsolete. Testing fixing can be done at any stage in the life cycle. However, the cost of finding fixing errors increases dramatically as development progresses. Changing a Requirements document during the first review is inexpensive. It costs more when requirements change after the code has been written: the code must be rewritten. Bug fixes are much cheaper when programmers find their own errors. Fixing an error before releasing a program is much cheaper than sending new disks, or even a technician to each customers site to fix it later. It is illustrated in Figure 1.1. The types of testing required during several phases of Software lifecycle are described below: Requirements Requirements must be reviewed with the client; rapid prototyping can refine requirements accommodate changing requirements. Specification The specifications document must be checked for feasibility, traceability, completeness, absence of contradictions ambiguities. Specification reviews (walkthroughs or inspections) are especially effective. Design Design reviews are similar to specification reviews, but more technical. The design must be checked for logic faults, interface faults, lack of exception handling, non-conformance to specifications. Implementation Code modules are informally tested by the programmer while they are being implemented (desk checking). Thereafter, formal testing of modules is done methodically by a testing team. This formal testing can include non-execution-based methods (code inspections walkthroughs) execution-based methods (black-box testing, white-box testing). Integration Integration testing is performed to ensure that the modules combine together correctly to achieve a product that meets its specifications. Particular care must be given to the interfaces between modules. The appropriate order of combination must be determined as top-down, bottom-up, or a combination thereof. Product Testing The functionality of the product as a whole is checked against its specifications. Test cases are derived directly from the specifications document. The product is also tested for robustness (error-handling capabilities stress tests). All source code documentation are checked for completeness consistency. Acceptance Testing The Software is delivered to the client, who tests the Software on the actual h/w, using actual data instead of test data. A product cannot be considered to satisfy its specifications until it has passed an acceptance test. Commercial off-the-shelf (or shrink-wrapped) Software usually undergoes alpha beta testing as a form of acceptance test. Maintenance Modified versions of the original product must be tested to ensure that changes have been correctly implemented. Also, the product must be tested against previous test cases to ensure that no inadvertent changes have been introduced. This latter consideration is termed regression testing. Software Process Management The Software process management plan must undergo scrutiny. It is especially important that cost duration estimates be checked thoroughly. If left unchecked, errors can propagate through the development lifecycle amplify in number cost. The cost of detecting fixing an error is well documented is known to be more costly as the system develops. An error found during the operation phase is the most costly to fix. 1.5 Principles of Software Testing Software testing is an extremely creative intellectually challenging task. The following are some important principles [DAV95] that should be kept in mind while carrying Software testing [PRE01] [SUM02]: Testing should be based on user requirements: This is in order to uncover any defects that might cause the program or system to fail to meet the clients requirements. Testing time resources are limited: Avoid redundant tests. It is impossible to test everything: Exhaustive tests of all possible scenarios are impossible, because of the many different variables affecting the system the number of paths a program flow might take. Use effective resources to test: This represents use of the most suitable tools, procedures individuals to conduct the tests. Only those tools should be used by the test team that they are confident familiar with. Testing procedures should be clearly defined. Testing personnel may be a technical group of people independent of the developers. Test planning should be done early: This is because test planning can begin independently of coding as soon as the client requirements are set. Test for invalid unexpected input conditions as well as valid conditions: The program should generate correct messages when an invalid test is encountered should generate correct results when the test is valid. The probability of the existence of more errors in a module or group of modules is directly proportional to the number of errors already found. Testing should begin at the module: The focus of testing should be concentrated on the smallest programming units first then expand to other parts of the system. Testing must be done by an independent party: Testing should not be performed by the person or team that developed the Software since they tend to defend the correctness of the program. Assign best personnel to the task: Because testing requires high creativity responsibility only the best personnel must be assigned to design, implement, analyze test cases, test data test results. Testing should not be planned under the implicit assumption that no errors will be found. Testing is the process of executing Software with the intention of finding errors. Keep Software static during test: The program must not be modified during the implementation of the set of designed test cases. Document test cases test results. Provide expected test results if possible: A necessary part of test documentation is the specification of expected results, even though it is impractical. 1.6 Software Testability Its Characteristics Testability is the ability of Software (or program) with which it can easily be tested [PRE01] [SUM02]. The following are some key characteristics of testability: The better it works, the more efficient is testing process. What you see is what you test (WYSIWYT). The better it is controlled, the more we can automate or optimize the testing process. By controlling the scope of testing we can isolate problems perform smarter retesting. The less there is to test, the more quickly we can test it. The fewer the changes, the fewer the disruptions to testing. The more information we have, the smarter we will test. 1.7 Stages in Software Testing Process Except for small programs, systems should not be tested as a single unit. Large systems are built out of sub-systems, which are built out of modules that are composed of procedures functions. The testing process should therefore proceed in stages where testing is carried out incrementally in conjunction with system implementation. The most widely used testing process consists of five stages that are illustrated in Table 1.1. Errors in program components, say may come to light at a later stage of the testing process. The process is therefore an iterative one with information being fed back from later stages to earlier parts of the process. The iterative testing process is illustrated in Figure 1.2 and described below: Unit Testing: Unit testing is code-oriented testing. Individual components are tested to ensure that they operate correctly. Each component is tested independently, without other system components. Module Testing: A module is a collection of dependent components such as an object class, an abstract data type or some looser collection of procedures functions. A module encapsulates related components so it can be tested without other system modules. Sub-system (Integration) Testing: This phase involves testing collections of modules, which have been integrated into sub-systems. It is a design-oriented testing is also known as integration testing. Sub-systems may be independently designed implemented. The most common problems, which arise in large Software systems, are sub-systems interface mismatches. The sub-system test process should therefore concentrate on the detection of interface errors by rigorously exercising these interfaces. System Testing: The sub-systems are integrated to make up the entire system. The testing process is concerned with finding errors that result from unanticipated interactions between sub-systems system components. It is also concerned with validating that the system meets its functional non-functional requirements. Acceptance Testing: This is the final stage in the testing process before the system is accepted for operational use. The system is tested with data supplied by the system client rather than simulated test data. Acceptance testing may reveal errors omissions in the systems requirements definition (user-oriented) because real data exercises the system in different ways from the test data. Acceptance testing may also reveal requirement problems where the system facilities do not really meet the users needs (functional) or the system performance (non-functional) is unacceptable. 1.8 The V-model of Testing To test an entire software system, tests on different levels are performed. The V model [FEW99], shown in figure 1.3, illustrates the hierarchy of tests usually performed in software development projects. The left part of the V represents the documentation of an application, which are the Requirement specification, the Functional specification, System design, the Unit design. Code is written to fulfill the requirements in these specifications, as illustrated in the bottom of the V. The right part of the V represents the test activities that are performed during development to ensure that an application corresponding to its requirements. Unit tests are used to test that all functions and methods in a module are working as intended. When the modules have been tested, they are combined and integration tests are used to test that they work together as a group. The unit- and integration test complement the system test. System testing is done on a complete system to validate that it corresponds to the system specification. A system test includes checking if all functional and all non-functional requirements have been met. Unit, integration and system tests are developer focused, while acceptance tests are customer focused. Acceptance testing checks that the system contains the functionality requested by the customer, in the Requirement specification. Customers are usually responsible for the acceptance tests since they are the only persons qualified to make the judgment of approval. The purpose of the acceptance tests is that after they are preformed, the customer knows which parts of the Requirement specification the system satisfies. 1.9 The Testing Techniques To perform these types of testing, there are three widely used testing techniques. The above said testing types are performed based on the following testing techniques: Black-Box testing technique Black box testing (Figure 1.4) is concerned only with testing the specification. It cannot guarantee that the complete specification has been implemented. Thus black box testing is testing against the specification and will discover faultsofomission, indicating that part of the specification has not been fulfilled. It is used for testing based solely on analysis of requirements (specification, user documentation). In Black box testing, test cases are designed using only the functional specification of the software i.e without any knowledge of the internal structure of the software. For this reason, black-box testing is also known as functional testing. Black box tests are performed to assess how well a program meets its requirements, looking for missing or incorrect functionality. Functional testing typically exercise code with valid or nearly valid input for which the expected output is known. This includes concepts such as boundary values. Performance tests evaluate response time, memory usage, throughput, device utilization, and execution time. Stress tests push the system to or beyond its specified limits to evaluate its robustness and error handling capabilities. Reliability tests monitor system response to represent user input, counting failures over time to measure or certify reliability. Black box Testing refers to analyzing a running program by probing it with various inputs. This kind of testing requires only a running program and does not make use of source code testing of any kind. In the security paradigm, malicious input can be supplied to the program in an effort to cause it to break. If the program breaks during a particular test, then a security problem may have been discovered. Black box testing is possible even without access to binary code. That is, a program can be tested remotely over a network. All that is required is a program running somewhere that is accepting input. If the tester can supply input that the program consumes (and can observe the effect of the test), then black box testing is possible. This is one reason that real attackers often resort to black box techniques. Black box testing is not an alternative to white box techniques. It is a complementary approach that is likely to uncover a different type of errors that the white box approaches. Black box testing tries to find errors in the following categories: Incorrect or missing functions Interface errors Errors in data structures or external database access Performance errors, and Initialization and termination errors. By applying black box approaches we produce a set of test cases that fulfill requirements: Test cases that reduce the number of test cases to achieve reasonable testing Test cases that tell us something about the presence or absence of classes of errors. The methodologies used for black box testing have been discussed below: 1.9.1.1 Equivalent Partitioning Equivalence partitioning is a black box testing approach that splits the input domain of a program into classes of data from which test cases can be produced. An ideal test case uncovers a class of errors that may otherwise before the error is detected. Equivalence partitioning tries to outline a test case that identifies classes of errors. Test case design for equivalent partitioning is founded on an evaluation of equivalence classes for an input condition [BEI95]. An equivalence class depicts a set of valid or invalid states for the input condition. Equivalence classes can be defined based on the following [PRE01]: If an input condition specifies a range, one valid and two invalid equivalence classes are defined. If an input condition needs a specific value, one valid and two invalid equivalence classes are defined. If an input condition specifies a member of a set, one valid and one invalid equivalence class is defined. If an input condition is Boolean, one valid and invalid class is outlined. 1.9.1.2 Boundary Value Analysis A great many errors happen at the boundaries of the input domain and for this reason boundary value analysis was developed. Boundary value analysis is test case design approach that complements equivalence partitioning. BVA produces test cases from the output domain also [MYE79]. Guidelines for BVA are close to those for equivalence partitioning [PRE01]: If an input condition specifies a range bounded by values a and b, test cases should be produced with values a and b, just above and just below a and b, respectively. If an input condition specifies various values, test cases should be produced to exercise the minimum and maximum numbers. Apply guidelines above to output conditions. If internal program data structures have prescribed boundaries, produce test cases to exercise that data structure at its boundary. White-Box testing technique White box testing (Figure 1.5) is testing against the implementation as it is based on analysis of internal logic (design, code etc.) and will discover faultsofcommission, indicating that part of the implementation is faulty. Designing white-box test cases requires thorough knowledge of the internal structure of software, and therefore the white-box testing is also called the structural testing. White box testing is performed to reveal problems with the internal structure of a program. A common goal of white-box testing is to ensure a test case exercises every path through a program. A fundamental strength that all white box testing strategies share is that the entire software implementation is taken into account during testing, which facilitates error detection even when the software specification is vague or incomplete. The effectiveness or thoroughness of white-box testing is commonly expressed in terms of test or code coverage metrics, which measure the fraction of code exercised by test cases. White box Testing involves analyzing and understanding source code. Sometimes only binary code is available, but if you decompile a binary to get source code and then study the code, this can be considered a kind of white box testing as well. White box testing is typically very effective in finding programming errors and implementation errors in software. In some cases this activity amounts to pattern matching and can even be automated with a static analyzer. White box testing is a test case design approach that employs the control architecture of the procedural design to produce test cases. Using white box testing approaches, the software engineering can produce test cases that: Guarantee that all independent paths in a module have been exercised at least once Exercise all logical decisions Execute all loops at their boundaries and in their operational bounds Exercise internal data structures to maintain their validity. There are several methodologies used for white box testing. We discuss some important ones below. 1.9.2.1 Statement Coverage The statement coverage methodology aims to design test cases so as to force the executions of every statement in a program at least once. The principal idea governing the statement coverage methodology is that unless a statement is executed, we have way of determining if an error existed in that statement. In other words, the statement coverage criterion [RAP85] is based on the observation that an error existing in one part of a program cannot be discovered if the part of the program containing the error and generating the failure is not executed. However, executed a statement once and that too for just one input value and observing that it behaves properly for that input value is no guarantee that it will behave correctly for all inputs. 1.9.2.2 Branch Coverage In branch coverage testing, test cases are designed such that the different branch conditions are given true and false values in turn. It is obvious that branch testing guarantees statement coverage and thus is a stronger testing criterion than the statement coverage testing [RAP85]. 1.9.2.3 Path Coverage The path coverage based testing strategy requires designing test cases such that all linearly independents paths in the program are executed at least once. A linearly independent path is defined in terms of the control flow graph (CFG) of the program. 1.9.2.4 Loop testing Loops are very important constructs for generally all the algorithms. Loop testing is a white box testing technique. It focuses exclusively on the validity of loop constructs. Simple loop, concatenated loop, nested loop, and unstructured loop are four different types of loops [BEI90] as shown in figure 1.6. Simple Loop: The following set of tests should be applied to simple loop where n is the maximum number of allowable passes thru the loop: Skip the loop entirely. Only one pass thru the loop. Two passes thru the loop. M passes thru the loop where m N-1, n, n+1 passes thru the loop. Nested Loop: Beizer [BEI90] approach to the nested loop Start at the innermost loop. Set all other loops to minimum value. Conduct the simple loop test for the innermost loop while holding the outer loops at their minimum iteration parameter value. Work outward, conducting tests for next loop, but keeping all other outer loops at minimum values and other nested loops to typical values. Continue until all loops have been tested. Concatenated loops: These can be tested using the approach of simple loops if each loop is independent of other. However, if the loop counter of loop 1 is used as the initial value for loop 2 then approach of nested loop is to be used. Unstructured loop: This class of loops should be redesigned to reflect the use of the structured programming constructs. 1.9.2.5 McCabes Cyclomatic Complexity The McCabes Cyclomatic Complexity [MCC76] of a program defines the number of independent paths in a program. Given a control flow Graph G of a program, the McCabes Cyclomatic Complexity V(G) can be computed as: V(G)=E-N+2 Where E is the number of edges in the control flow graph and N is the number of nodes of the control flow graph. The cyclomatic complexity value of a program defines the number of independent paths in the basis set of the program and provides a lower bound for the number of test cases that must be conducted to ensure that all statements have been executed at least once. Knowing the number of test cases required does not make it easy to derive the test cases, it only gives an indication of the minimum number of test cases required. The following is the sequences of steps that need to be undertaken for deriving the path coverage based test case of a program. Draw the CFG. Calculate Cyclomatic Complexity V(G). Calculate the basis set of linearly independent paths. Prepare a test case that will force execution of each path in the basis set. 1.9.2.6 Data Flow based Testing The data flow testing method chooses test paths of a program based on the locations of definitions and uses of variables in the program. Various data flow testing approaches have been examined [FRA88] [NTA88] [FRA93]. For data flow testing each statement in program is allocated a unique statement number and that each function does not alter its parameters or global variables. For a statement with S as its statement number, DEF(S) = {X| statement S contains a definition of X} USE(S) = {X| statement S contains a use of X} If statement S is if or loop statement, its DEF set is left empty and its USE set is founded on the condition of statement S. The definition of a variable X at statement S is live at statement S, if there exists a path from statement S to S which does not contain any condition of X. A definition-use chain (or DU chain) of variable X is of the type [X,S,S] where S and S are statement numbers, X is in DEF(S), USE(S), and the definition of X in statement S is live at statement S. One basic data flow testing strategy is that each DU chain be covered at least once. Data flow testing strategies are helpful for choosing test paths of a program including nested if and loop statements 1.9.3 Grey-Box testing technique Grey box testing [BIN99] designs test cases using both responsibility-based (black box) and implementation-based (white box) approaches. To completely test a web application one needs to combine the two approaches, White-box and Black-box testing. It is used for testing of Web based applications. The Gray-box testing approach takes into account all components ma