Wednesday, September 2, 2020

Comparing The U.S. Health Care System with that of The United Kingdom Essay

Looking at The U.S. Medicinal services System with that of The United Kingdom - Essay Example (Joined Nations Development Program; See Table 1). This implies social insurance is an extravagance that individuals with more cash can purchase a greater amount of and a superior nature of. Deciding to use an arrangement of secretly supported human services might be an aftereffect of the demeanor of the United States of being free, which can be interpreted as meaning liberated from government control or impedance in the free market. While there is open financing accessible for the older and the incredibly poor, numerous individuals despite everything don't get the human services they need. This absence of human services for residents who need it is right now a subject of much discussion. The United Kingdom, then again, reserves its residents' medicinal services openly, through assessments. As indicated by the 2007-2008 Human Development Report, 7% of GDP in the United Kingdom is spent on general social insurance while simply 1.1% must be spent secretly. (Joined Nations Development Program; See Table 1). This distinction in uses in the United Kingdom means the perspective on medicinal services as an essential human right as opposed to a cash based benefit. At the point when human services started to be openly subsidized, the thought was that if Britain could progress in the direction of full business and go through colossal wholes of cash during the wartime exertion, at that point in a period of harmony evenhanded proportions of social solidarity and monetary assets could be diverted towards cultivating open products. (Wikipedia, 2008). Albeit freely subsidized human services gives more medicinal services to a more noteworthy number of individuals, a few people accept that the nature of social insurance gave is lower. Now and again individuals decide to look for private human services, in the event that they can bear the cost of it, however they are regularly disturbed about paying for both private medicinal services and the general social insurance they are quitting. Numerous individuals don't care for the inclination that they are paying for the social insurance of others who become ill more oftentimes or are less solid. Another worry with the United Kingdom's general social insurance framework is that patients are frequently waitlisted to see specialists for squeezing matters; this has prompted superfluous passings. (Browne, 2001). Putting the private versus open subsidizing banter aside quickly, there shows up likewise to be disparity in the aggregate sum of consolidated open and private cash spent on human services between the United States and the United Kingdom. In view of the recently talked about measurements, the United States burns through 15.4% of GDP on its human services while the United Kingdom spends an extensively lower 8.1% of GDP on social insurance. As far as what this implies for every individual dwelling in these nations, while per capita GDP in the United States is $41,890 and $6,096 of that is spent on medicinal services, per capita GDP in the United Kingdom is a somewhat lower $36,509 yet a fundamentally lower sum, just $2,560 per capita is spent on human services. (Joined Nations Development Program; See Table 1). By having everybody contribute a tad to the whole society's medicinal services, apparently human services turns out to be altogether less expensive for everybody. It is addition ally fascinating to take note of that the United States, with a GDP (in a large number of) $12,416.5, when contrasted with the United Kingdom's $2,198.8, would have a great deal of GDP to spend somewhere else if just 8.1% was spent on social insurance rather than 15.4%. Since there are many blended sentiments

Saturday, August 22, 2020

A Tale of Two Cities and Julius Caesar Essay Example | Topics and Well Written Essays - 500 words

A Tale of Two Cities and Julius Caesar - Essay Example Murder has been a subject applied in plot advancement with variable definitions held in the topic relying upon the support offered for the activity. In a story of two urban communities and Julius Caesar, murder is resolved to explain equity, and the subject is advanced in the main characters. The two stories had been composed dependent on murder and a comprehension, to the purpose behind the utilization of the topic would offer the required answer for the author’s instinct to apply the style. Charles Dickens composed the story to portray the secretive disclosure of Alexandre Manette condition who had been thought to have kicked the bucket. The dad to Lucie Manetter had been unjustly detained in Bastille, and she searched out on the excursion with Jarvis Lorry to discover her dad. The urban communities that witness the occasions are Paris and London where mistreatment of the frail and love is defended to prompt the saw occasions. Carton’s murder is legitimized as he takes the wrongly blamed Darnay position on the grounds that for the love he had towards Lucie Manetter. Darwin composes the story where the two Carton and Darnay began to look all starry eyed at Lucie, yet Darnay wound up being her significant other. In any case, on coming back to Paris, Darnay is caught to be indicted. Container spares his love’s marriage by taking the situation of his opponent to be killed for the reason for adoration (Dickens 366). Thusly, Mr. Defarge had been killed following allegations that he had killed the laborer kid, however the occasion had been a mishap. The boy’s father killed Defarge on the grounds that he had neglected to make an endeavor to spare the kid. Shakespeare had composed the play to portray murder as a main subject in his plot advancement. Caesar had been from the fight successful and had been in line to be delegated the preeminent pioneer. In any case, with his capacity, a portion of his officers developed envious and stressed that he would introduce an overbearing guideline over the individuals. The officers make an arrangement to kill Caesar and include Brutus in the plot

Friday, August 21, 2020

The Yanoman :: essays research papers

The Yanoman This ethnography is about the Yanomam. A great many people will think about these individuals as 'crude'. Yet, we don't consider the way that these individuals take a gander at us and call us 'crude' and 'subhuman'. This is the reason it is imperative to pass judgment these individuals with a fair-minded brain. The Yanomam are Indians that live generally dispersed in southern Venezuela furthermore, northern Brazil. They normally live in towns of 75 to 80 individuals. Yet, there are towns in which there are as meager as 40 individuals or upwards of 250 individuals in a solitary town. The Yanomam live by a blend of cultivation and scrounging. Each family in the town clears their own territory and develops it themselves. Boss, who need to deliver more nourishment to meet their commitment to give accommodation, generally gets help from others. A town can deliver all of its needs from just three hours worth of work per individual. One trait of the Yanomam is that they are acquainted with savagery. Viciousness is a piece of their lives on account of their qualities and culture. Along these lines, the Yanomam live in a steady condition of fighting. Fighting shows up as a principle intrigue bolstered by an allowance of faith based expectations encouraging solid towns to exploit the more vulnerable ones. A standard arrangement of degrees of brutality has been regulated. It ranges from chest beating to side slapping. Both are probably going to cause injury or passing. The Yanomam don't use a lot of innovation aside from in their weapons. The principle weapon delivered by the Yanomam are bolts. They make bolts that are six feet long. These bolts are exact. Bolts fill in as weapons as well as as significant belongings that are normally traded as endowments among the Yanomam. Â Â Â Â Â Villages that are close by may now and again partner. One explanation in which the partner is with the goal that they can collaborate against another bigger town. So as to exhibit their companionship towards one another, the two towns exchange and feast. Â Â Â Â Â The men sedate themselves every day with a substance called 'ebene'. It reasons for the eyes to get watery. Another impact of this medication is and unnecessary creation of mucous. The beneficiary takes into account the mucous to dribble unreservedly from every nostril. It is accepted among these individuals that the utilization of this medication will have an impact wherein terrible spirits are eased of. Â Â Â Â Â The dead are exceptionally regarded in this culture. When an individual kicks the bucket, it is taboo to make reference to the name of the individual until the end of time. It is viewed as an offense to make reference to the name of a relative that has died.

Friday, June 5, 2020

Training Models Essay - 275 Words

Models of Training (Essay Sample) Content: MODELS OF TRAININGNameProfessorCourseInstitutionDateDistance learning is an educational format designed to enable students utilize the option of attaining educational qualifications without having to physically attend classes. It has the feature of flexibility and convenience for students since they can schedule themselves and set their own pace of work. Students can work and at the same time continue with education. At my workplace, distance learning would come in handy where an employee cannot attend classes physically due to time and budget constraints. As a Point of sale administrator, I am usually required to be at work for extra hours and my working shifts are usually not the same. They also are not predictable. However, I usually have free time in intermittently during my discourse of duty. This work mode does not allow me to attend even evening classes. The most suitable method, if I am to advance my education, training and skills is via distance learning.With distance learning, I will be able to organize myself how I deem fit. This would depend on my current work schedule. I would study during the intermittent free sessions at work. It is also a convenient method, since, I wouldnà ¢Ã¢â€š ¬t have to pay for the extra costs for library access, tuition among others. My busy work schedule will not affect my studying as adversely as it would, should I have studied fulltime. With internet connection, Ià ¢Ã¢â€š ¬ll be able to access study material and lecture videos online, from anywhere, at work, at home and elsewhere. Ià ¢Ã¢â€š ¬ll be able to study whenever I settle. At times, I have trouble handling some technical issues while at work. This can partly be attributed to my level of training.Further study and training will help me be more knowledgeable and able to handle more complicated tasks as a result. This would even be more suitable since I would be studying while practicing my trade. Sometimes, technical issues that require knowledge from further training arise. For instance, am fully trained on networks installations and am aware of the best protocols to implement in order to get the best from the network. However, new devices keep being introduced in the organization, for instance ipads and tablets. There arises a need...

Sunday, May 17, 2020

Oedipus vs. Creon - 1174 Words

One City; Two Corrupt Leaders In the plays Oedipus Rex and Antigone by Sophocles, Oedipus and Creon exert similar characteristics as leaders that ultimately result in their characterization as tragic heroes. They take a similar course throughout their stories, which leads to a similar fate, resulting in tragedy. Both characters tried to revive a city in need, but in the process, the hubris they possessed got in the way. Both men had the chance to see that their actions would lead to a tragic ending, but neither one could see around their pride. Because of their tragic flaws, these two rulers caused great pain to themselves, their family and the people of Thebes. Although Oedipus and Creon ruled over Thebes at different times, the truth†¦show more content†¦With these uncontrollable fates, both Oedipus and Creon would experience enormous grievances, which would lead them to realize that Tiresias had been right all along and that they should have taken time to think over their actions. Both Oedipus and Creon experience terrible loses at the end of each play, which causes them to feel grief and remorse for their actions. After Oedipus receives the shocking revelation from Tiresias that he is the man that he has scorned and sentenced to exile, his mother, whom he married, kills herself and Oedipus realizes that all of his life he had been living a lie. Oedipus grieves over the loss of his beloved wife and mother but is also disgusted with himself. He cannot live with the shame of his incest, so he takes the broche from the dress of Jocasta and proceeds to blind himself. He is terribly upset over everything that has happened and cannot live with the reactions he fears he will get from the people of Thebes. Oedipus then follows through on the law he had set and exiles himself from the city. At the end of Antigone, Creon goes to the cave he has enclosed Antigone in, only to find his son Haimon has beaten him there and Antigone hanging from the roof of the c ave. Haimon is so angry with his father that upon Creon’s arrival to the cave, Haimon tries to stab Creon. He is unsuccessful, but then turns around and stabs himself. Creon has now lostShow MoreRelatedContrast Between Oedipus the King and Antigone by Sophocles744 Words   |  3 PagesContrast between Oedipus the King and Antigone Sophocles, a famous and renowned Greek dramatist, is the playwright to both the play Oedipus the King and Antigone. Along with Antigone and Oedipus Sophocles had also wrote Electra and Fete. Sophocles wrote many Greek tragedies which are plays in which the main character in the play suffers a tragedy due to some flaw of theirs. An example would be how Oedipus (thinking he is defying a prophecy) murders his father and weds his mother. His flaw was himRead MoreThe Difference Between Good And Evil?978 Words   |  4 PagesEnglish CP10 Final Draft 16 Oct. 2014 O vs. C What is the difference between good and evil? How can one person’s life be more tragic than another? What is a tragedy? â€Å"A tragedy is a dramatic composition, often in verse, dealing with a serious or somber theme, typically that of a great person destined through a flaw of character or conflict with some overpowering force, as fate or society, to downfall or destruction† (Dictionary.com). The play Oedipus Rex by Sophocles includes different rulingsRead MoreComparison Of Oedipus The King And Antigone By Sophocles944 Words   |  4 Pageslearned from Sophocles plays Oedipus the King and Antigone. In Oedipus the King, Oedipus caused his fate to become real by running from it. He killed his father and made love to his mother even though he had no idea who they were he was still punished. He passed the punishment of his sins to the rest of his family when he gouged out his eyeballs and banished himself from the city. In Antigone Oedipus’s sons killed each o ther in battle over the throne and helped Creon take over the throne. He madeRead MoreReview Of Oedipus Rex 1342 Words   |  6 PagesJake Gilman Modern Mythology Period 8 Fusaro Oedipus Rex Reading Questions What appears to be the function of the Chorus? - The chorus in Greek tragedies has a similar function to the narrator in various books and plays. It is an outside source that describes the actions of the characters, as well as their thoughts or feelings. Just like a narrator, the chorus can be used to foreshadow an upcoming event and provide more detail than what is said on stage. However, theRead MoreA Greek Play Created By Sophocles1608 Words   |  7 Pagesplay created by Sophocles around 335 BC, Oedipus the King tells a story about one man’s irony to find the previous’ king’s murderer to seek justice. Oedipus stops at nothing to find the killer. As he questions the citizens, he only finds himself to be the killer. In this essay we explore how one major event can create multiple forms of conflict. The conflicts of Human vs. supernatural, the predestined fate of Oedipus and the gods. Human vs. human, when Oedipus heeds no warnings and stops at nothingRead MoreOedipus Fate And Fate Essay777 Words   |  4 PagesSophocles discusses fate vs free will in his plays. In the play Oedipus Rex there was a prophecy that Oedipus was destined to kill his father and marry his mother, he attempts to escape his destiny by running away to Thebes where he meets his fate. In the play Antigone, that main character Antigone decides to go against Creon’s (her uncle who has inherited the throne) decree and bury the brother, Polynices, knowing the consequences would lead to her death. In Sophocles’ plays Oedipus Rex and Antigone,Read MoreOedipus Rex Character Analysis1419 Words   |  6 PagesOedipus’s role, within the play â€Å"Oedipus Rex† to convey different emotions. The roles portrayed by the characters showcase that Sophocles specified each character to represent and illustrate a type of emotion and a specific trait that added to his play, while giving a profound plot with entertaining conflict. Sophocles’ tragedy â€Å"Oedipus Rex† demonstrates his uses of conscience/morality/religion vs. pride/power to illustrate the concept of woman vs. man. Oedipus’ pride and arrogance stands in theRead MoreOedipus The King : The Dramatic Twist Of Fate1148 Words   |  5 PagesSophocles wrote â€Å"Oedipus Rex† on C. 430 B.C.E as part of a trilogy, Oedipus the King was later translated by Dudley Fitts and Robert Fitzgerald which still conveyed the dramatic twist of fate in this historic play. The introduction of this play begins with Oedipus’s father Laïos, King of Thebes, being warned through a prophecy that his son will kill him and marry his wife Iocaste, Queen of Thebes. Knowing that this could be his future Laïos try his best to change his fate, not knowing his fateRead More Sophocles Antigone – Comparing the Symbolic Alignment Utilized by Creon and President George Bush1023 Words   |  5 PagesUtilized by Creon and President George Bush ... he who has not first laid his foundations may be able with great ability to lay them afterwards, but they will be laid with trouble to the architect and danger to the building. - The Prince by Machiavelli Sophocles addresses this very problem in his play Antigone by the methods Creon uses to rule Thebes. Creon begins ruling Thebes in a very difficult time and circumstance. The polis has been embroiled in tragedy for over a generation. Creon must ruleRead MoreGilgamesh And Oedipus Essay904 Words   |  4 Pages2017 Gilgamesh vs. Oedipus No two men are alike in anyway, same goes for heroes and tragic heroes. A hero is someone who has given their life to be something bigger than oneself. A hero is someone who is brave, courageous and someone you look up to. Aristotle referred to a tragic hero as, â€Å"someone who makes their own judgement error that inevitably leads to their own destruction†. Gilgamesh and Oedipus were some of the biggest heroes in our literary studies. Gilgamesh and Oedipus lived their lives

Wednesday, May 6, 2020

The Social Premises Causing Gender Gap Within Maths And...

The primary division of humanity into men and women and the dominant role of men in modern society has led to the obvious prevalence of men, it can be traced in all cultural and historical periods, particularly in areas such as science. Most of the STEM (Science, Technology, Engineering and Math) University graduates are men. Among STEM graduates aged 25 to 34, women represented 23% of graduates from engineering and 30% of graduates from mathematics and computer science programs. (Gender differences in science, technology, engineering, mathematics and computer science (STEM) programs at university, n.d.). This research paper is going to focus on the studies investigating the social premises causing the gender gap in maths and science involvement. Difference in the number of male and female individuals studying maths and science is a consequence of the continued normative social construction of gender, social prejudice ensured through, but no limited to previous female exclusion from education system. Attempts to explain the differences between men and women in the level of educational and professional achievements are reduced to two schemes: biological (genetic) differences between men and women and the social conditions favorable to male domination, the system of education and the distribution of roles which gives more chances for the development of abilities of men. Most researchers who study cognition in terms of gender differences, primarily focused on the study ofShow MoreRelatedOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pages: alk. paper)—ISBN 978-1-4399-0271-4 (electronic) 1. History, Modern—20th century. 2. Twentieth century. 3. Social history—20th century. 4. World politics—20th century. I. Adas, Michael, 1943– II. American Historical Association. D421.E77 2010 909.82—dc22 2009052961 The paper used in this publication meets the requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials, ANSI Z39.48-1992 Printed in the United States of America Read MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 PagesPrinter/Binder: Courier/Kendallville Cover Printer: Courier/Kendalville Text Font: 10.5/12 ITC New Baskerville Std Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on the appropriate page within text. Copyright  © 2013, 2011, 2009, 2007, 2005 by Pearson Education, Inc., publishing as Prentice Hall. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtainedRead MoreFundamentals of Hrm263904 Words   |  1056 PagesSelection 7 Training and Development 7 Ethics and Employee Rights 7 Motivating Knowledge Workers 7 Paying Employees Market Value 8 Communications 8 Decentralized Work Sites 8 Skill Levels 8 A Legal Concern 8 Employee Involvement 20 How Organizations Involve Employees 20 Employee Involvement Implications for HRM 20 Other HRM Challenges 21 Recession 21 Off Shoring 21 Mergers 22 A Look at Ethics 22 Summary 23 Demonstrating Comprehension: Questions for Review 24 Key Terms 24 HRM Workshop 25 Linking ConceptsRead MoreDeveloping Management Skills404131 Words   |  1617 PagesSoftware Services Printer/Binder: Edwards Brothers Cover Printer: Coral Graphics Text Font: 10/12 Weidemann-Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright  © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protectedRead MoreHuman Resources Management150900 Words   |  604 Pagesother jobs. This growth means that people without high school diplomas or appropriate college degrees increasingly will be at a disadvantage, as their employment opportunities are confined to the lowest-paying service jobs. In short, there is a growing gap between the knowledge and skills required by many jobs and those possessed by employees and applicants. Several different studies and projections all point to the likelihood that employers in many industries will have difficulties obtaining sufficientlyRead MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesManagement Course: MBA−10 General Management California College for Health Sciences MBA Program McGraw-Hill/Irwin abc McGraw−Hill Primis ISBN: 0−390−58539−4 Text: Effective Behavior in Organizations, Seventh Edition Cohen Harvard Business Review Finance Articles The Power of Management Capital Feigenbaum−Feigenbaum International Management, Sixth Edition Hodgetts−Luthans−Doh Contemporary Management, Fourth Edition Jones−George Driving Shareholder Value Morin−Jarrell LeadershipRead MoreStrategic Marketing Management337596 Words   |  1351 PagesAgency Ltd, 90 Tottenham Court Road, London, England W1T 4LP. Applications for the copyright holder’s written permission to reproduce any part of this publication should be addressed to the publisher Permissions may be sought directly from Elsevier’s Science Technology Rights Department in Oxford, UK: phone: ( 44) 1865 843830, fax: ( 44) 1865 853333, e-mail: permissions@elsevier.co.uk. You may also complete your request on-line via the Elsevier homepage (www.elsevier.com), by selecting ‘Customer Support’Read MoreProject Managment Case Studies214937 Words   |  860 Pagesprofit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the Un ited States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic booksRead MoreMedicare Policy Analysis447966 Words   |  1792 PagesEducation and Labor, Ways and Means, Oversight and Government Reform, the Budget, Rules, Natural Resources, and the Judiciary, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the committee concerned A BILL To provide affordable, quality health care for all Americans and reduce the growth in health care spending, and for other purposes. 1 Be it enacted by the Senate and House of Representa-

Tuesday, May 5, 2020

Computerized Asset Management System free essay sample

TITLE PAGE COMPUTERIZED ASSET MANAGEMENT SYSTEM (A Generic Case Study) BY DEPARTMENT OF COMPUTER SCIENCE IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF NATIONAL DIPLOMA IN COMPUTER SCIENCE AUGUST 2008 CERTIFICATION This is to certify that this project being an original work was undertaken by - Project SupervisorDate Director of StudiesDate DEDICATION This project work is dedicated to the God Almighty; the giver of life, strength, wisdom and every good gifts who has seen us through the challenges of making this work a reality. . AKNOWLEDGEMENT There are many individuals who contributed to the production of this project work through their moral and technical support, advice or participation. Finally, we would like to thank our families and friends for their understanding, encouragement, and support over the completion and fulfillment of our project work. ABSTRACT The record keeping routines, information tracking, complicated logistics and many other administrative procedures are all regular activities that constantly make up the core processes in the management of real and financial assets. However these processes could be quite cumbersome and inefficient when manual systems being used continue to play prominent roles in organizations that offer such services. Basically, with the advent of Information Technology (IT), some organizations, government agencies, individuals etc. ave employed various database management software including relational database and spreadsheet software for the management of assets. However, these application software are generic; hence there is need to design a system that is tailored to specific need of asset management. Consequently, this project work finds it necessary to study and analyze the difficulties inherent in the administration and management of asset manually in organizations with a view to proposing an extensive solution to these problems. TABLE OF CONTENTS CONTENTSPages TITLE PAGE-i CERTIFICATIONii DEDICATIONiii ACKNOWLEDGEMENTiv ABSTRACT-v TABLE OF CONTENTSVI CHAPTER ONE NTRODUCTION1 DEFINITION OF TERMS2 PROBLEM STATEMENT3 OBJECTIVES OF THE STUDY-4 SCOPE OF PROJECT4 SIGNIFICANCE OF THE STUDY-5 LIMITATIONS CONSTRAINTS OF THE ROJECT-6 CHAPTER TWO LITERATURE REVIEW ASSETS-7 ASSET MANAGEMENT9 COMPUTERIZATION10 PROBLEMS INHERENT IN THE EXISTING SYSTEM-12 CHAPTER THREE SYSTEM ANALYSIS AND DESIGN SYSTEM ANALYSIS-13 SYSTEM DESIGN14 SPECIFICATION REQUIREMENT14 SYSTEM ARCHITECTURE-19 CHAPTER FOUR – IMPLEMENTATION LANGUAGE OF IMPLEMENTATION21 CODING-22 SYSTEM REQUIREMENTS-22 THE INTERFACE OF THE NEW SYSTEM24 UPDATE AND MAINTENANCE OF SYSTEM25 CHAPTER FIVE – SUMMARY CONCLUSION AND RECOMENDATION SUMMARY-26 CONCLUSION26 RECOMMENDATION27 APPENDIX 1 – PROGRAM CODE28 APPENDIX 2 – PROGRAM FLOWCHART32 APPENDIX 3 – GUIDELINES FOR DBASE DESIGN-33 APPENDIX 4 – DIAGRAM OF ASSET MAGT SYSTEM-34 APPENDIX 5SCREENSHOT OF INTERFACE35 REFERENCES38 CHAPTER ONE INTRODUCTION Asset intensive industries face the harsh realities of operating in highly competitive markets and dealing with high value facilities and equipment where each failure is disruptive and costly. At the same time, they must also adhere to stringent occupational safety, health and environmental regulations. Maintaining optimal availability reliability and operational safety of plant, equipment, facilities and other assets is therefore essential for an organizational competitiveness. The function of asset management are taking a fundamental turn where organizations are moving from historical reactive (run-to-failure) models and beginning to embrace whole life planning, life cycle costing, planned and proactive maintenance and other industry best practices. Asset Management is not operational excellence but instead focused on effectiveness; bring out the most of every capital investment or expense from a planning perspective. It has a long-term view, strives for balanced investment-risk-performance levels and supports data driven decision-making required for all ‘discretionary spending’. However, some companies still regard manual asset management procedure, despite the evolution of information technology, which cannot meet up the above challenges; hence the objective of this project work is to present a conceptual and practical approach for the management of asset using a computer program. This is necessary due to the accuracy, efficiency and reliability of computer in performing rigorous tasks such as manipulation and querying of large volume of data which is relevant in managing asset. 1. Definition of Terms The major variables in this work are Asset, Management, Computerization and System. The definitions of these variables are given below: 1. 1. 1Asset – this could be defined as a person or thing that is valuable or useful to something. Banking and Finance defines asset as a thing which belongs to a company or person which has value. 1. 1. Management – this could be defined as the act of running and controlling a business or similar organization. 1. 1. 3Computerization – this word is derived from the word computerized, which means to provide a computer or computers to do the work of something. 1. 1. 4System – this is defined as a collection or assemblage of different part or component that is connected together in an organized way in ord er to achieve a particular goal to satisfy a particular interest. System could also defined in computer term as a collection of procedures and devices working together as a unit. . 2Problem Statement The application of computer in virtually all fields of human endeavor has tremendously improved the mode of operations in organizations. However, some organizations and companies still rely on manual asset management as well as record keeping, which is tedious and the procedure is cumbersome. These problems are listed below: †¢ Inaccurate data entry and mix-up of records †¢ Unavailability of accurate data-bank of records since paper is a bio-degradable material they tend to spoil with time †¢ Ineffective security of documents Long process on retrieval of record due to large volume of paper stored †¢ Delay in accounting and auditing proceedings due to tedious process involved in record retrieval †¢ Documents occupy a lot of space that could be put into other prof itable use. 1. 3Objectives of the Study The objectives of the study are: †¢ To eliminate the error associated with the existing system. †¢ To provide more reliable storage and retrieval of asset record through the use of computer. †¢ To increase information availability and accessibility. To enable asset managers easily estimate asset net-worth through the use of inbuilt computerized logic on asset models. 4. Scope of the Project The scope of this study covers the following: †¢ Basic procedures and process associated with record keeping †¢ Availability of interactive and easy to use Graphical User Interface (GUI) with vital components in form format, which enable users to enter information about financial assets and fixed assets. †¢ The application includes tools that allow users to estimate the net-worth of a particular asset. 5. Significance of the Study The significance of computerization of asset management system includes the following: †¢ Speed – computers operate at a very high speed that enables users to enter, store data and retrieve information within a very short time. †¢ Storage – Computer has a very high storage capacity; be it internal or external storage media, which is a vital aspect of asset management. †¢ Accuracy – the high degree of accuracy exhibited by computer is of essence in record keeping and accounting procedures in asset management. †¢ Efficiency – the efficiency of computers can improve the overall efficiency of organization. Reduction of Complexity – the complexities in record keeping and computation of asset values can be drastically reduced by the application of some statistical tools embedded in computer systems. †¢ Security – computerized system offers better security facilities, which is needed in asset management to safeguard the inte grity and confidentiality of vital data and information organizations. †¢ Error Detection and Correction – computerized systems can easily detect errors like wrong spelling or formula in processing data and suggest appropriate correction needed. 6. Limitations and Constraints of the Project The following limitations and constraints were experienced: †¢ The project is generic in its approach to Asset Management as it is not targeted towards any specific Organization. †¢ Effective utilization of advanced accounting and administrative tools were intentionally omitted from our research and study specifications due to restrictions we were subject to under specified curriculum. †¢ Finance – this research work has been constrained by lack of funds. Hence, it was difficult to acquire some materials that would have enhanced the work. Time – considering the originality of this project, more time would have been required for an extensive work. †¢ Insufficient information – Some organizations relevant to this research work could not release some vital information for fear of compromising the integrity of their management procedures. CHAPTER TWO LITERATURE REVIEW This chapter reviews some literatures related to this project with the aim of designing a computerized system that would be replaced with the popular manual asset management system, which is tedious, cumbersome and time consuming to manage. Consequently, there is need to understand what assets are, the different types of assets and the kind of information about assets that are needed in order to ensure effective management of assets records. 2. 1What are Assets? In this context the definition of asset is very broad. Anything that is used by an organization in order for it to achieve its function can be considered and asset of the organization. This will include a number of different types of assets and are classified based their characteristics. Some types of assets are listed below: †¢ Fixed Assets – these are assets that could last as long as the company or organization exists. They include office furniture, vehicles, etc. †¢ Liquid Assets – liquid assets include cash or bills that can easily be converted to cash. †¢ Financial Assets – these include investment and cash at hand. These kinds of assets could also be seen as claim against the income or wealth of business organization; usually represented by a certificate or legal documents, which include bonds, insurance policies, stocks, deposits etc. However, considering the importance of financial assets in this project, it is necessary to consider some of its characteristics and categories. Characteristics of Financial Assets †¢ Financial assets cannot be depreciated †¢ They do not provide continuous stream of service to their owners †¢ They can easily be converted to another form, which could be substituted for other assets. For example shares can be converted to another form of asset desired by its owner. Different types of Financial Assets Basically financial assets are divided into four groups; namely: †¢ Equities – this is also known as stock, which represents ownership shares in a business firm in which it could be used as claim against the firm’s success. Equities are also categorized into common stock and preferred stock. Common stock entitles its holder to vote for the members of the firm’s board of directors while preferred stock has no such privileges. Preferred Stock also known as capital stock provides a specific dividend that is paid before any dividends are paid to common stock holders, and which takes precedence over common stock in the event of liquidation. †¢ Money – this is any financial asset that is generally accepted as payment of the purchase of goods and services. Derivatives – these are the newest type of financial assets being introduced, which has unique financial claims. Its market value is influenced by the return on a related financial instrument such as loans, bonds, stock etc. 2. What is Asset Management? Asset management is a general term with many different meanings, depending on which governmental agency or organization is using it. The clerk considers asset management the appropri ate recording and report of assets in accordance with generally accepted accounting principles. The finance director considers asset management as a strategic financial plan. The utility director thinks of his or her job and maintaining the utility’s infrastructure in good working order. The utility supervisor thinks of a work order system that helps plan and control resources and equipment. The Information Technology (IT) director sees asset management as another enterprise wide, integrated suite of computer software and hardware requirements. Since all of these agencies have policy criteria they are responsible to meet, designing asset management system must consider all criteria in order to be useful and successful. According to Austroads, asset management may be defined as a comprehensive and structured approach to the long term management of assets as tools for the efficient and effective delivery of community benefits. The emphasis is on the assets being a means to an end, not an end in themselves. Asset management refers to the professional management of investments such as stocks and bonds, along with real estate. Typically, asset management is only practiced by the very wealthy, as the services of a professional firm can demand considerable sums of money, and successful asset management usually requires a large and diverse portfolio. . What is Computerization? This is concern with provision of computer or computers to do the work of something. Computerization could be defined as the technological application of electrical and computer based systems to supplement the operations and control the activities of an organization. This technological application could include computer process contr ol, feedback control, planning, data collection and decision making support facilities. Computerization aids in automation of processes that usually required tedious manual inputs and outputs. In the light of these broad definitions Computerized Asset Management System could be seen as professional management of investments such as stocks and bonds, along with real estate by means of technological application of electrical and computer based systems to supplement the operations and control the activities of an organization. Asset management can be relatively tedious and is error prone when using the manual system that is associated with rendering such services. However, with the use of computers, this can be easily done in record time and faster than the manual process. In relation to the above mentioned facts, this work (Computerized Asset Management System) seeks to highlight the problems associated with the existing manual system with a view to making necessary recommendations that seek to eliminate the indices inherent problems thereby presenting the computerized system as a preferred solution. 2. 4Problems Inherent in the Existing Manual System The following are the lapses in the existing manual system: †¢ Inaccurate data entry and mix-up of records †¢ Unavailability of accurate data-bank of records since paper is a bio-degradable material they tend to spoil with time Ineffective security of documents †¢ Long process on retrieval of record due to large volume of paper stored †¢ Delay in accounting and auditing proceedings due to tedious process involved in record retrieval †¢ Documents occupy a lot of space that could be put into other profitable use. CHAPTER THREE SYSTEM ANALYSIS AND DESIGN Systems are created to solve problems. In this dynamic world, the subject of System Analysis and Design mainly deals with software development activities. The process of building a software system, from analysis to implementation is generally referred to as Software Project Development Life Cycle. The various aspects of the Software Project Development Life Cycle concerned with this project are enumerated below: 3. 1System Analysis Analysis involved a detailed study of the current system, leading to specifications of a new system. It is also a detailed study of various operations performed by a system and their relationships within and outside the system. 3. 1. 1System Study. System study is the first stage of system development life cycle. This gives a clear picture of what actually the physical system is. This study is usually done in two phases. In the first phase, the preliminary survey of the system is done which helps in identifying the scope of the system. The second phase is more detailed and in-depth study in which the identification of user’s requirement and the limitations and problems of the present system are studied. It also involves checking existing system by carefully analyzing the process involved, in this case manual method of asset management. Hence, problems noticed in the existing system prompted us to consider a better solution to the current method of manual processing. . 1. 2Feasibility Study. On the basis of result of the initial study, feasibility study takes place. The feasibility study is basically the test of the proposed system in the light of its workability, meeting user’s requirements, effective use of resources and of course the cost effectiveness. 3. 2 System Design Based on the user requirements and the detailed analysis of a new system, the new system must be designed. In the design of the proposed system, the following specific requirements are considered. 3. 3Specification Requirement Input Specification Considering the proposed system various input are required by the user such as Username, password, new asset acquired including its type, value, location, date etc. However these input data has to be specified so that the computer can carry on necessary manipulation. Input Specification for Real Assets (SQL Server Settings) |Data Item |Data Type |Length |Description | |ID |Varchar |10 |Identification number of asset | |Item |Char 10 |Asset name | |Category |Char |10 |Asset type/category | |Description |Varchar |100 |Asset detailed description | |Manufacturer |Char |50 |Asset manufacturer (for real assets like cars, | | | | |machinery etc) | |Model |Varchar |50 |Asset Model (for real/fixed assets) | |Date Acquired |Datetime |9 |Date asset was acquired | |Purchase Price |Money |8 |Price of asset at time of purchase (for | | | | |real/fixed asset) | |Current Value |Money |8 |Value of asset based on depreciation parameter | |Condition |Char |10 |Physical condition of assets (for fixed/real | | | | |assets) | |Location |Varchar |200 |Place where asset is located/ can be found | |Owner |Varchar |100 |Owner of asset | |Retired Date |Datetime |9 |Date of discontinued use of asset | |Comments |Varchar |250 |Detailed comment/information about asset | |Attachments |Nvarchar/binary | |Attachment files such as images, electronic | | | | |receipt of purchase etc. | Input Specification(s) for Financial Assets |Data Item |Data Type |Length |Description | |Asset ID |Varchar |10 |Identification number of asset | |Asset Name |Varchar |20 |Name/Title of asset | |Description |Varchar |100 |Detailed description of asset | |Category/Type |Varchar |50 |Type of financial asset (i. e. onds, treasury bills, | | | | |stocks etc) | |Issuer |Varchar |50 |Issuer of asset/IOU | |Date of Acquisition |Datetime |9 |Date asset was acquired | |Value |Money |8 |Value of asset at acquisition | |Current Market Value |Money |8 |Value of asset at a point in time based on market | | | | |factors | |Maturity |Datetime |9 |Maturity date for IOUs, bonds, treasury bills etc | |Owner |Varchar |20 |Name of asset holder | Input Specification for Users (Holders of Assets) Data Item |Data Type |Length |Description | |ID |Varchar |10 |Unique Identification number for holder/bearer of asset. | |First Name |Varchar |20 |First Name of asset holder | |Last Name |Varchar |20 |Last Name of asset holder | |Company |Varchar |20 |Employer of bearer/holder of asset | |Job Title |Varchar |50 |Job Description/Occupation of holder | |Email |Varchar 100 |Email address of holder | |Phone Number |Varchar |20 |Contact number of holder/bearer | |Address |Varchar |100 |Contact address of holder of asset | Output Specification/Expectation Expected output includes windows-based forms for data entry and manipulation, validation, security, and hard copy reports printing features on assets. File and Storage Requirements Data is stored on a relational database; the data base software used is Microsoft SQL Server2002. The storage device used for the proposed system is hard drive. Control and backups – the security and control facilities of the proposed system ensure the accuracy, security and privacy of the software resources. Control and backups control for the proposed system include: †¢ Requirement of password for access †¢ Software checks †¢ Periodic backup copies of the system Personnel and Procedure – The proposed software is going to be used by client and company’s administrator; hence there would be need to hire the service of a database manager. 3. 4 System Architecture The proposed system combine page layout with application content to create sophisticated database-driven windows forms with controls, validation and security. [pic] Presentation Layer – The system comprises windows (forms)-based user interface, including data validation logic for built-in field types. An extensive set of intelligent field types is supported providing built-in validation for data types like email addresses, currency, and phone numbers †¢ Business Layer The Business layer is where the bulk of business logic resides. †¢ Data-Access Layer – the application’s data access code, table sorting logic, table filtering logic etc are all part of this layer. It includes SQL statements and queries needed for storing retrieving, and filtering data from the database. †¢ Database Layer – This is the actual RDBMS and objects of the database such as SQL Queries, Views, and Stored Procedures. CHAPTER FOUR IMPLEMENTATION Implementation is the stage of a project during which theory is turned into practice. This stage includes software acquisition and development, personnel hiring and training, site preparation and data preparation, installation, testing etc. The stages for implementing the proposed system are listed enumerated below: 4. 1Language of Implementation The programming language used is Microsoft’s Visual Basic. VB. NET is an offshoot of Visual Basic programming language developed by Microsoft. It is one of the fourth generation Object Oriented Programming Languages, as against Visual Basic that is largely a procedural language. VB. NET is the only . NET language that supports late binding. In the VS. NET IDE, VB. NET rovides a dropdown list at the top of the code window with all the objects and events; the IDE does not provide this functionality for any other language. VB. NET is also unique for providing default values for optional parameters, and for having a collection of the cont rols available to the developer. 4. 2Coding This refers to the process of writing the program instructions that will process the data and produce the output specified in the program design. Analysis of  some VB. Net code †¢ Imports System. Data †¢ Imports System. Data. SqlClient †¢ Imports System. Data. OleDb These objects enable you to interface with all sorts of data sources, from text files to Microsoft SQL Server, to Oracle, or even with custom data sources created by the programmer. 4. 3 System Requirement This consists of the hardware and software requirements needed for the proposed system to operate at a maximum efficiency. 4. 3. 1 The hardware requirements †¢ Pentium 4 2. 4 GHz †¢ 80GB Hard disk drive †¢ 512 MB RAM †¢ BIOS standard with embedded extensions (Basic input/Output system) 4. 3. 2 The Software Requirement †¢ Window XP embedded with service pack 2 †¢ Database Software (MsSQLserver2000) †¢ Visual Basic. Net The final stage of implementation is the conversion of the system. At this stage, manual working has to shift from manual to computerized working. Basically, two strategies are applied on conversion process, which are Pilot and Parallel. In Pilot run or conversion strategy, the new system is installed in parts. Some part of the new system is installed first and executed successfully for considerable time period. When the results are found satisfactory that other parts are implemented. While in Parallel conversion, both the computerized and manual systems are executed in parallel. This strategy is recommended for the implementation of this project because of the following benefits: †¢ Manual results can be compared with the results of the computerized system. †¢ Failure of the computerized system at the early stage, does not affect the working of the organization, because the manual system continues to work, as it used to do. 4. The Interface of the New System †¢ The application login Page (this requires a User name and Password) †¢ Application’s Main Page – this page is an MDI form from were other windows can be called and users can interact with the user. It contains a menu bar with menus, a toolbar, a tree view and a tab page control which enable users to interact with the system †¢ Contact Details page – used to enter information about Asset owners into the database †¢ Asset Details page – used to Enter assets into the database and to find asset information. †¢ Admin Password Setting page – this page is used to change and update username and password of users of the system A Report Page – uses crystal Reports to display information about assets. 4. 5Update and Maintenance of System Since humans and their demands are dynamic, the system needs to be maintained and updated frequently to adapt to the ever-changing technological world and the changing environment. Periodic updating of the computerized asset management system is necessary with the assistance of a system programmer, system designer and database administrator to ensure that no corrupt hardware or software has been installed in the system. Also needed is vir us protection software to safeguard the system from falling victim to many types of viruses e. g. a Trojan Horse and worms. A virus is simply malicious software that is intended to infiltrate a computer system and corrupt it). Username and password of administrator should be kept secret, as exposure of this detail would allow unauthorized users access to the database, thus exposing the financial details of clients. A periodic update of the database is needed to keep the system up to date, as the need arises. The maintenance process would also involve correcting errors as and when they occur, documentation of the system updates and corrections. CHAPTER FIVE SUMMARY, CONCLUSION AND RECOMMENDATION 5. 1Summary The project work is a result of efforts to fully computerize and display the modern means of managing asset using a generic case study. The use of a computerized system in managing assets would definitely enhance the process of asset management. The implementation of this project will surely improve the efficiency and effectiveness of asset Management organizations in terms of storing, saving large volumes of data of assets, and easy access to asset information which will improve the decision making process of such organization. 5. 2 Conclusion Computerization has affected every facet of the society from politics, education, leisure, business and entertainment. Hence, asset management as one of the determinants of a successful economy should not be left out. 5. 3Recommendation It is recommended that the Use of Computerized Asset Management system will improve the effectiveness and efficiency of Asset Management Companies such as Investment Banking Trust Company (IBTC), UBA Trustees and other Real Asset Management Companies as well as individuals who manage their own portfolio of assets. Database Layer Stored Procedures SQL Queries Database Data Access Layer Utility Classes Data Access Classes Table-Specific Data Access Classes Transaction Management Data Cache Management Connection Management Business Layer Table Classes Record Classes Presentation Layer Code-Behind Sub-classes Security Code Behind Validation Code User Interface