Thursday, October 31, 2019

Reward And Motivation As Factors For The Productivity Dissertation

Reward And Motivation As Factors For The Productivity - Dissertation Example There are certain needs and demands of both employee and employer such as labor force are required to perform efficiently when organizations are investing in resources they would demand reliable workforce meeting all standards of productivity (Leboeuf, 1986). On the other hand, employees have expectations related to handsome reward, job security, workplace environment and respect (Blackburn & Lawrence, 1995). Now, these attributes can be taken as motivation factors because given the expectation both parties will be better-served employers will enjoy productivity whereas workers will enjoy the reward. Since both parties are attaining what they desire, ultimately the company’s performance will boost up. It might be easy to say that expectations can be met easily but practically the utopia can only be achieved when organizations understand the needs of their employees. Understanding workers’ needs, in other words, is the analysis which tells organizations how to motivate t heir workers (Podmoroff, 2005). This study is conducted to understand those needs and their patterns which in turn motivate workers for best performance. What can actually be called a motivation? Motivation can be any item or factor that can encourage and energize employees’ behavior to work harder (Tracy, 2013). These sets of principles or factors which invigorate performance can either be social, cultural, societal, financial or even psychological. It relies upon the management to successfully understand its workers demand and need and it is the utter duty of managers to trigger the motivational processes in the right direction (Scheuer, 2000). Motivation is a driving force which is accumulated through altered scenarios and lead individual to accomplish their targets. When targets are achieved, it portrays individual performance.

Tuesday, October 29, 2019

Which factors influence students self-efficacy with regard to their Research Proposal

Which factors influence students self-efficacy with regard to their academic performance - Research Proposal Example Therefore, self-efficacy in academic performance would refer to the confidence that individual students have on academic issues that allow them to be successful in academic endeavours. Most researchers would agree that there are several factors that have a direct influence on the efficacy of students but these would highly depend on the cultural fits that happen in the educational system and curriculum. The idea of self-efficacy does not just come by chance to the involved victors but there is always a great deal of hard work that aims at maintaining the faith to get the high levels of educational success (Bandura, 1982, p.126). This proposal will seek to provide a base for justification of the fact that self-efficacy has a direct impact on academic performance of students that are involved in an academic program that is on distance basis. In-view of this, it will provide background information about the genesis of self-efficacy in students before embarking on plot development. Backg round of the Study The importance of efficacy is gaining acceptance with every passing day. From a psychological point of view, self-efficacy is a creation from the theories of efficacy as brought forward by Bandura. Self-efficacy is about inclusiveness. This inclusiveness is about the end result. It is an issue that started long ago but Bandura (1977) indicated that here are very important sections of personality that will render the effects effective with the final impact of motivation for student success. The areas that are aimed at being promoted are in accomplishments of performance, verbal and emotional arousal and vicarious experience. To cement the value of self-efficacy in the development of motivation of students therefore, there will be an objective and analytical view of four key issues. These issues will represent the objective of statement question in which case there is need to link self-efficacy and student academic performance in the post graduate case as indicated (Banduras, 1977). Factors Influencing Students Self-Efficacy Self-efficacy is influenced by a collection of very strong factors that influence the total personality of an individual. Experience or "Enactive Attainment† Experience is a very determining factor when it comes to issue of self-efficacy. Dissects (2012) dissects experience as immediate and former. In both cases, it has far reaching effects on the behaviour and confidence of the students and their eventual success. Postgraduate education requires a high sense of risk taking through project and online submissions. This is to say that there is a risk that is taken but the success of previous students may inculcate confidence in the current group. In this case, strong efficacy is generated through such former success by the current students. In vicarious experience, there is a situation in which students watch others handle very complex experiences and succeed which helps them hope for the same (Yao, 2007, p. 6). This p ositive show is enhanced through modelling, performance exposure, performances that are self-instructed as well as performance

Sunday, October 27, 2019

The Tcp Service Model Information Technology Essay

The Tcp Service Model Information Technology Essay The transport service is implemented by a transport protocol used between two transport entities. The transport protocol have to deal with error control, sequencing, and flow control. UDP is a simple protocol and it has some niche uses, such as client-server interactions and multimedia, but for the most Internet applications, reliable, sequenced delivery is needed.UDP cannot provide this, so another protocol is required. It is called TCP and is the main workhouse of the internet. THE TCP SERVICE MODEL: TCP service is obtained by both the sender and receiver creating end points, called sockets. A socket may be used for multiple connections at the same time. All TCP connections are full duplex and point to point. Full duplex means that the traffic can go in both directions at the same time. Point-to-point connection contains exactly two end points. Another feature of the TCP service is URGENT DATA. When the urgent data are received at the destination. The receiving application is interrupted so it can stop whatever it was doing and read the data stream to find the urgent data. The start of the urgent data is not marked while the end is marked so the application knows when it is over. This scheme basically provides a crude signaling. THE TCP PROTOCOL: A key feature of TCP, and one which dominates the protocol design, is that every byte on a TCP connection has its own 32-bit sequencer. When the internet began, the lines between routers were mostly 56-kbps leased lines, so a host blasting away at full speed took over 1 week to cycle through the sequence numbers. Separate 32-bit sequence numbers are used for acknowledgements and for the window mechanism. The sending and receiving TCP entities exchange data in the form of segments. What should a segment have? 1.Each segment including the TCP header, must fit in the 65,515-bytes IP payload. 2.Each network has a maximum transfer unit, or MTU, and each segment must fit in the MTU. THE TCP SEGMENT HEADER: The following is the dissection of TCP header field by field. The Source port and Destination port fields identify the local end points of the connection. The source port number is of 16 bits and indentifies the sending host TSAP(client port number). The destination port number is of 16 bits and is used to identify the receiver host TSAP(server port number). The sequence number is of 32 bits size. Since TCP supports Byte-stream, in which each byte is numbered, big space is allocated for numbering i.e.(2 power 32=4096 million).With the help of these numbers only ,one can be able to differentiate the old delayed duplicate with fresh ones. The acknowledgement number is of 32 bits size. It specifies the next byte expected. The length of TCP header is of 4 bits size and indicates the number of rows. Next comes a 6-bit field that is UNUSED. The fact that this field has survived intact for over a quarter of a century is testimony to how well thought out TCP is. Lesser protocols would have needed it to fix bugs in the original design. Six 1-bit flags: 1. URG is set to 1 if the urgent flag pointer is in use. 2. The ACK bit is set to 1 to indicate that the acknowledgement number is valid. If ACK is 0, the segment does not contain an acknowledgement so the ACKNOWLEDGEMENT NUMBER is ignored. 3. The PSH bit indicates pushed data. 4. The RST bit is used to reset a connection that has become confused due to a host crash or some other reason. It is also used to reject an invalid segment or refuse an attempt to open a connection. In general, if you get a segment with the RST bit on, you have problem on your hands. 5. The SYN bit is Synchronization flag. It is used to establish connections. The connection request has SYN=1 and ACK=0 to indicate that the piggyback acknowledgement field is not in use. The connection reply does bear an acknowledgement, so it has SYN=1 and ACK=1. 6. The FIN bit is finish flag. It is used to release a connection. It specifies that the sender has no more data to transmit. CHECKSUM: A checksum is also provided for extra reliability. It checks the header, the data and the conceptual pseudoheader. When performing this computation, the TCP Checksum field is set to zero and the data field is padded out with an additional zero byte if its length is an odd number. PSEUDOHEADER: The pseudoheader contains the 32-bit IP addresses of the source and destination machines, the protocol number for TCP (6), and the byte count for the TCP segment. Including the pseudoheader in the TCP checksum computation helps detect misbelieved packets. TCP CONNECTION MANAGEMENT MODELING: The steps required to establish and release connections can be represented in a finite state machine with the 11 states listed below. In each state, certain events are legal .when a legal event happens, some action may be taken. If some other event happens, an error is reported. State Description CLOSED No connection is active or pending LISTEN The server is waiting for an incoming call SYN, RCVD A connection request has arrived: wait for ACK SYN SENT The application has started to open a connection ESTABLISH The normal data transfer state FIN WAIT 1 The application has said it is finished FIN WAIT 2 The other side has agreed to release TIMED WAIT Wait for all packets to die off CLOSING Both sides have tried to close simultaneously CLOSING WAIT The other side has initiated a release LAST ACK Wait for all packets to die off Each connection starts in the CLOSED state. When it performs either a passive open {LISTEN}, or an active open {CONNECT}, it leaves the state. If the other side does the opposite one, a connection is established and the state becomes ESTABLISHED. Connection release can be initiated by either side. The state returns to CLOSED, after it is completed. Description of the figure: The heavy solid line is the normal path for a client. The heavy dashed line is the normal path for a server. The light lines are unusual events. Each transition is labeled by the event causing it and the action resulting from it, separated by a slash. The event can either be a user à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬initiated system call {CONNECT, LISTEN, SEND or CLOSE}, a segment arrival [SYN, FIN, ACK or RST}, or in one case, a timeout of twice the maximum packet lifetime. The action is the sending of a control segment {SYN, FIN or RST} or nothing, indicated by -.Comments is shown in parentheses. Figure: TCP connection management finite state machine. TCP TRANSMISSION POLICY: Windows Management in TCP is not directly tied to acknowledgements as it is in most data link protocols. If the sender transmits a 2048-byte segment that is correctly received, the receiver will acknowledge the segment. However, since it now has only 2048 bytes of buffer space (until the application removes some data from the buffer), it will advertise a window of 2048 starting at the next byte expected. The window management in TCP is shown in the following figure. Now the sender transmits another 2048 bytes, which are acknowledged, but the advertised window is 0. The sender must stop until the application process on the receiving host has removed some data from the buffer, at which time TCP can advertise a larger window. Senders are not required to transmit data as soon as they come in from the application. When the first 2 KB of data came in, TCP, knowing that it had a 4 KB window available, would have been completely correct in just buffering the data until another 2KB came in, to be able to transmit a segment with a 4KB payload. This freedom can be exploited to improve performance. On the following grounds the sender com still send segments upon receiving the win=0(window size) or (buffer available). When the window=0;the sender may not normally send segments, with two exceptions i)URGENT DATA MAY BE SENT To allow the user to kill the process running on the remote machine. ii)The sender may send a 1byte segment to make the receiver re-announce the next byte expected and window size. SILLY WINDOW SYNDROME: To transmit 1byte of message TCP overhead 20 bytes, IP are required.In other words just to transmit 1 byte, extra 40 Bytes are required. Whenever there is a 1 byte room available at the receiver buffer, the window update segment is sent. Since the receiver is requested for 1 byte the sender sends 1 byte which leads to the receiver buffer to be full over again. Asking for 1 Byte and sending 1 byte appears to be silly, hence the name silly window syndrome. To avoid Silly window syndrome, Nagle suggested NAGLES APPROACH: When the data comes to the sender 1 byte at a time, just send the first Byte and buffer, all the rest until the outstanding Byte is acknowledged. Then send all the buffered characters in one 1 TCP segment and start buffering again until they are all acknowledged. Nagles approach cannot be implemented for all applications. In particular, when as X-windows application is being run over the internet, mouse movements have to be sent to the remote computer. Gathering them and sending them in bursts makes the mouse cursor more erratically, which makes users dissatisfied. CLARKS ALGORITHM: This approach is to prevent the receiver from sending a window update for 1byte instead, it is forced to wait until it has a decent amount of space available and then advertise that. Nagles algorithm is with respect to sender and Clarkà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s algorithm with respect to solve Silly window syndrome. The overall goal is for the sender not to send small segments and the receiver not to ask for them. TCP CONGESTION CONTROL: When the load offered to any network is more than it can handle, congestion builds up. The Internet is no exception. Although network layer also tries to manage congestion, most of the heavy lifting is done by TCP because the real solution to congestion is to slow down the data rate. In theory, congestion can be dealt with by employing a principle borrowed from physics: the law of conservation of packets. The idea is to refrain from injecting a new packet into the network until an old one leaves.TCP attempts to achieve this goal by dynamically manipulating the window size. The first step in managing congestion is detecting it. A timeout caused by a lost packet could have been caused by either (1) noise on a transmission line or (2) packet discard at a congested router. Nowadays, packet loss due to transmission errors is relatively rare because most long-haul trunks are fiber. All the Internet TCP algorithms assume that timeouts are caused by congestion and monitor timeouts for signs of trouble the way miners watch their canaries. TCP TIMER MANAGEMENT: TCP uses multiple timers to do its work. The most important of these is the retransmission timer. When a segment is sent, a retransmission timer is started. If the segment is acknowledged before the timer expires, the timer is stopped. If, on the other hand, the timer goes off before the acknowledgement comes in, and the segment is retransmitted. A second timer is the persistence timer. It is designed to prevent the following deadlock. The receiver sends an acknowledgement with a window size of 0, telling the sender to wait.Later, the receiver updates the window, but the packet with the update is lost. Now both the sender and the receiver are waiting for each other to do something. When the persistence timer goes off, the sender transmits a probe to the receiver. The response to the probe gives the window size. If it is still zero, the persistence timer is set again and the cycle repeats. If it is nonzero, data can now be sent. A third timer that some implementations use is the keep alive timer. When a connection has been idle for a long time, the keep alive timer may go off to cause one side to check whether the other side is still here. If it fails to respond, the connection is terminated. This feature is controversial because it adds overhead and may terminate an otherwise healthy connection due to transient network partition. The last timer used on each TCP connection is the one used in the TIMED WAIT state while closing. It runs for twice the maximum packet lifetime to make sure that when a connection is closed; all packets created by it have died off.

Friday, October 25, 2019

Why Hamlet is a Tragic Hero and the Play a Classic Tragedy :: essays research papers

Dear Kylie, I noticed your submission to Culture Magazine, regarding Shakespeare’s great play â€Å"Hamlet†. Having recently studied â€Å"Hamlet† in Year 12 English, I think I can help answer one of your questions. You asked why is Hamlet regarded as a tragic hero and the play a classic tragedy? Before I can answer your question, you must first understand the difference between the meaning of tragedy today and what is meant by tragedy in drama. Whereas a tragedy in life may be considered something such as a death or accident, in drama a tragedy in drama is much more. In a tragedy, although the hero may be in conflict with an opposing force, the cause of his downfall falls ultimately on himself. This is usually because of a character defect – a â€Å"tragic flaw† which causes him to act in a way which ends up bringing about his own misfortune, suffering and ultimately death. â€Å"Hamlet† is very much a tragedy, but it is also different, being a revenge tragedy where the hero is driven by the need for revenge, not unlike a modern day horror movie. Prince Hamlet is a tragedy of character where it is himself that brings his downfall, not fate. Well Kylie, a tragedy is usually a story of one person, with both the hero victims in the play usually of a high standing of society. This is especially the case in â€Å"Hamlet†, with his victims being King Claudius, Queen Gertrude, Polonious, Laertes, Rosencrantz and Guildenstern, all being linked to the Royal Family of Denmark. A personality fault (the tragic flaw) causes the hero to act in a manner which brings about his own misfortune and eventually death, during which he lets the audience know he is dying by delivering a final speech. In â€Å"Hamlet†, it is his tragic flaw of his indecisiveness and inability to act, which brings his own suffering and misfortune. Had he been able to kill King Claudius in the beginning none of the suffering would have occurred. He also delivers his final speech telling the audience of his death, â€Å"I am dead Horatio. Wretched queen, adieu!† he exclaims after being poisoned by Laertes envenomed rapier. In a tragedy the pity and fear (known in drama as pathos) is ultimately replaced by an uplifting and suffering (known in drama as catharsis) Hamlet’s acts cause suffering but in the end ultimately achieve learning. Hamlet’s ultimate death teaches the country of Denmark about Claudius’s murder and brings them under the reins of a new ruler Fortinbras of Norway.

Thursday, October 24, 2019

Biblical Worldview Essay Essay

Introduction The Bible is an illustration of God and His love for us. Within the pages that we so effortlessly read, it is our life long journey to embody Christ and adhere to scripture and it’s teachings. The lessons to be learned in life are all encompassed in God’s words. The Bible displays so many lessons on life and how our lives should resemble His love. In this essay, we will examine the scripture of Romans 1-8 as it teaches us in great multitude of how our biblical worldview derives from the various aspects within those chapters. The Natural World God made the heavens and the earth, therefore, any and all acknowledgment of the natural world is a blessing by which He spoke the words of life and it appeared. We give all praise to God for providing such a blissful place to lie before we unite with Him in Heaven. The natural world is distinctively seen throughout Romans but more so in Romans 1:20 where Paul writes, â€Å"For since the creation of the world God’s invisible qualities—his eternal power and divine nature—have been clearly seen, being understood from what has been made, so that people are without excuse.† This piece of scripture is saying that through all of our doubt in God and His power we can’t deny the fact that the world in which we live in is a product of His power. Without our natural world we would not exist and be able to live and die within our flesh. Our natural world is a showcase in which God shows His presence  within every facet of our natural world. Human Identity â€Å"Then God said, ‘Let us make mankind in our image, in our likeness, so that they may rule over the fish in the sea and the birds in the sky, over the livestock and all the wild animals, and over all the creatures that move along the ground.’ So God created mankind in his own image, in the image of God he created them; male and female he created them.† Written in Genesis 1:26-27. To identify as humans is to embody Him because God created us in His image and gives us the choice to be Christ-like. To be Christ-like we must connect with Christ in all avenues so that we may die with sinful flesh but forever live in Heaven as an untouchable essence that no sin can corrupt. We are designed in the image of God and it’s our sole purpose to live life and love, as His son Christ loved us. Human Relationships Human relationships are a complex aspect to our lives. If we look at this topic from a biblical worldview then all human relationships and encounters should derive from love and not of hate. Since we are created in God’s image it is only fitting that we pay other humans the same love that we grace in our Lord’s presence. In Romans 5 we read of how humans are destined to be sinful as a result of the original sin but through Christ’s birth and sacrifice we can be born again and be seen through a new light. Romans 6:11 states so clearly, â€Å"In the same way, count yourselves dead to sin but alive to God in Christ Jesus.† We are giving a second chance in living up to God’s image and allowing our human relationships to cultivate as a result of Christ’s love for us. From that point on we are no longer seeking out God’s acceptance but rejoicing in His profound forgiveness. Culture God does not see us as a culture or a race. He identifies us by our faith and saves us by his grace. Within the Roman scripture we see that the Romans  had faltered in their ways and the habits in which they displayed on a regular basis showed God that their culture was full of sin and that sin inevitably forced them to turn away from God. Acknowledging God’s presence but not acting in accordance to His word is a sign of a culture of rebellion and denial. The Romans turned their backs on God and this is not something that you would want God to do. Some cultures seek out God and long to live for Him and as stated from history, there are the lesser fortunate cultures and subcultures that follow their flesh and their minds. Your culture does not define your relationship with God but it can inhabit you from ever having a relationship with Him. Conclusion Throughout life we can identity what our worldviews are and throughout our life with God and the Bible we can stamp our biblical worldviews and share them to the world. The things we see, hear, touch, smell, and taste are all products of our God’s spoken words to create life. We should live everyday of our lives thanking Him for grace. We can be thankful that God created us all in His image and it is our life long pursuit to live Christ-like. Our flesh will always be a burden and let us down because of Adam’s sin yet it is Christ who sacrificed himself and gave us the opportunity to be born again. Our newfound life as a child of God is to live as Christ did and love others as He loves us. God loves us by grace and does not see us as cultures but as individuals whom seek him and love him as Christ does.

Wednesday, October 23, 2019

Jack Welch

Jack Welch was a CEO and chairman at General Electric for twenty years. During his time at GE he was able to transform the company into a very efficient and powerful company. His four E’s of leadership: energy, energizers, edge, and execute are keys to what made his leadership style work. Another part of his leadership style was getting rid of the people who did not work hard enough or meet expectations. Overall, Jack Welch’s leadership style changed GE and companies around the world for the better.The first of Welch’s four E’s is energy. This is the characteristic which describes people who are always ready to go and to work hard at a moments notice. These are the people that are hate dull moments and prefer to always be busy. Normally these are good workers, which sometimes stray from their work because they are so energetic. The second E is energizers. These are the people that motivate others to perform. They are the ones that outline what is needed or wanted to succeed, and have other people carry it out.In most cases, energizers are selfless and care about others before themselves. They care that the group succeeds and are quick to take ownership over something when it goes wrong. However, when someone in the group succeeds, they make sure the credit is given to the person. The third E is edge. This type of people is those who are extremely competitive. They make sure they do everything possible to succeed in whatever they do. People with edge are not slow to make a decision they believe will be beneficial.For example, these people are usually the ones who have to make decisions like firing, hiring, and promoting. They also do not let anything stand in their way, no matter what the circumstance is. What it takes to succeed, they will do. The last E is execute. Without a person that is able to execute, the rest of the E’s will be of no use and will have no way of completion. Also, executers know the difference between act ivity and productivity. They realize a person can be working, but the work may be irrelevant to the betterment of the company.For example, a person could be doing lots of work, but in reality unless the work is bettering the company it is completely unimportant and is basically just busy-work. The E’s are vital to how Jack Welch made his company run and how he viewed people in his workplace. Welch had a way of figuring out how people functioned in the workplace called differentiation. In this way of thinking, Welch described how people should be evaluated in their work, such as that of a teacher when she evaluates her students.This model is used to â€Å"weed out† the twenty percent of workers that do not better the company. He knew nearly everyone worked hard at his company, but it was the people that accomplished productive work that he kept to work at his company. The bottom ten to twenty percent of people were actually hurting the company more than they were helpin g financially. This was a way Welch made his company successful. He did not make it successful by changing what was at the top and going right, he changed what was at the bottom and actually bringing the company down.In conclusion, Jack Welch has a leadership style which was unlike the normal way of viewing efficiency. He looked to the people that were at the bottom rather than the top. Most people have a different way of viewing productivity, where they try to improve a part of the company which is already productive. Jack Welch was able to make GE a powerful company from a different perspective than most other leaders. Internet Sources 1. http://www. epinions. com/content_4565540996? sb=1 2. http://www. refresher. com/! svbfoures. html