Thursday, October 31, 2019

Wireless communication Essay Example | Topics and Well Written Essays - 3000 words

Wireless communication - Essay Example Unlike other previous forms of communication, wireless communication networks have increasingly gained popularity especially with the recent mode like 3G and 4G which have continuously improved data transfer and communication efficiency. Recent advances in technology have led to efficient satisfaction of the needs of consumers while ensuring that life is easier. The second generation GSM and its evolutional stages of GPRS and EDGE and third generation UMTS are discussed in detail to pave way in understanding the 4G technology. Wireless communication: 1G-4G cellular communication systems 1.0. Introduction Cellular mobile telephone systems development and deployment was triggered by the operational limitations of standard mobile telephone systems (Brand and Aghavami, 1). These limitations include limited capacity for service, inefficient utilization of spectrum and poor service performance. The communication of mobile phone occurs through a temporary distinct radio channel in order to communicate to the cell site. The cell site is contains several channels and each mobile talks to it through only one of the channels. The channels are characterized by a pair of frequencies which are used during the communication. The forward link transmits from the cell site to the users while the reverse link receives calls from users. The radio signal transmitted in early mobiles dissipated with distance and mobiles had to stay close to the base station in order to secure effective communications. According to Brand and Aghvami (1), moving mobile users were not sufficiently offered with an effective means of communication. Mobile radio service has its operations in a closed network with no access to the telephone system unlike the mobile telephone service that allowed interconnection to the telephone network. Traditionally, the mobile service structure included a single powerful transmitter that was located at a high spot to broadcast signals within a radius of up to about 50 km and the mobile telephones were attached to the transmitter (Brand and Aghvami, 2). Conversely, the introduction of cellular telephone system architecture involves placing numerous low-power transmitters within the entire coverage area and each covers a small area called the cell and using varying channels or conversions. The cellular telephone system allows a user to travel while making a phone call with no interruptions since they can use more than one base station. The application of the cellular concept in mobile telephone systems overcame interference problems and improved the efficiency of communication since the cells size was equivalent to the density and demand of subscribers in a particular area and was flexible to accommodate growing population’s demand and user density. Interference is overcame since a cluster can be reused in other cells while conversations can be handed off from one cell to the other and phone services maintained constantly as one moves between cells through handoff (Brand and Aghvami, 2). Cellular phone systems is characterized by four generations which are first generation or 1G, second generation or 2G, third generation or 3G and fourth generation or 4G. This paper explores cellular mobile system generations in terms of their capabilities, date of introduction, and comparison of inherent features. 2.0. First generation or 1G cellular phone systems The 1G cellular phone systems are characterized by the use of analog frequency modulation to facilitate the transmission of speech, frequency shift keying or FSK for signaling while FDMA or frequency Division Multiple Access for the sharing of assigned spectrum (Patil, Karhe and Aher, 614). The most

Tuesday, October 29, 2019

Financial statements Essay Example for Free

Financial statements Essay 1) Which of the following statements is true? 2) Notes to the financial statements include which of the following: 3) Which of the following financial statements is divided into major categories of operating, investing, and financing activities? 4) If the retained earnings account increases from the beginning of the year to the end of the year, then 5) If services are rendered on account, then 6) An investment by the stockholders in a business increases 7) Using accrual accounting, expenses are recorded and reported only: 8) A small company may be able to justify using a cash basis of accounting if they have: 9) Stockholders’ equity can be described as claims of 10) Common stock is reported on the 11) The Vintage Laundry Company purchased $6,500 worth of laundry supplies on June 2 and recorded the purchase as an asset. On June 30, an inventory of the laundry supplies indicated only $2,000 on hand. The adjusting entry that should be made by the company on June 12) On July 1 the Fisher Shoe Store paid $15,000 to Acme Realty for 6 months rent beginning July 1. Prepaid Rent was debited for the full amount. 13) Use the following data to determine the total dollar amount of assets to be classified as current assets. 14) Use the following data to calculate the current ratio. KoonceOffice Supplies Balance Sheet December 31, 2012 Cash $130,000 Accounts Payable $140,000 Prepaid Insurance 60,000 Salaries Payable 20,000 Accounts Receivable 100,000 Mortgage Payable 160,000 15) In horizontal analysis, each item is expressed as a percentage of the 16) When a change in depreciation method occurs: 17) Which of the following statements is true with respect to financial statement reporting for all cases when a company changes from one acceptable accounting method to another? 18) Which of the following would be considered a change in accounting principle? 19) From an internal control standpoint, the asset most susceptible to improper diversion and use is 20) A very small company would have the most difficulty in implementing  which of the following internal control activities? 21) The reconciliation of the cash register tape with the cash in the register is an example of 22) Deposits in transit 23) Which of the following items on a bank reconciliation would require an adjusting entry on the company’s books? 24) Notification by the bank that a deposited customer check was returned NSF requires that the company make the following adjusting entry: 25) Why do pension and mutual funds invest in debt and equity securities? 26) Which of the following is a debt security? 27) Reed Company acquires 80 Holmes 10%, 5 year, $1,000 bonds on January 1, 2012 for $82,000. This includes a brokerage commission of $2,000. The journal entry to record this investment includes a debit to 28) Reed Company acquires 80 Holmes 10%, 5 year, $1,000 bonds on January 1, 2012 for $82,000. This includes a brokerage commission of $2,000. Assume Holmes pays interest semiannually and the July 1 entry was done correctly. The journal entry at December 31, 2012 would include a credit to 29) A company that owns more than 50% of the common stock of another company is known as the 30) If a parent company has two wholly owned subsidiaries, how many legal and economic entities are there from the viewpoint of the shareholders of the parent company?

Sunday, October 27, 2019

Identity Theft And Phishing As Cybercrimes Criminology Essay

Identity Theft And Phishing As Cybercrimes Criminology Essay Cybercrimes can be defined as criminal activities which take place or occur within cyberspace. These crimes are common and ever increasing as cybercriminals continue to find new ways of taking advantage of unwary internet users (Mitchell, 2010). A frequently practiced form of cybercrime includes identity theft, which is the use of an individuals private details without their knowledge or approval (Ombudsman for Banking Services, 2009). This essay will discuss phishing as a form of identity theft with the use of various articles as examples to enhance the understanding of identity theft and phishing as cybercrimes. In addition, a criminological theory will be applied to identity theft in order to gain further insight into this particular cybercrime. Defining Cybercrime Cybercrime is used generally to describe a variety of illegal offences of which only a few are specifically associated with computers and the telecommunications infrastructure that supports their use. This specific crime type involves the utilization of digital technologies in the task of the offence or is specifically directed at computing and communications technologies, or is incidental to the commission of other crimes (Smith et al. 2004:7). Identity theft and phishing can be described as forms of cybercriminal activity. These crimes are defined as hybrid crimes. Hybrid crimes are those which can exist online as well as offline. Specifically, these crimes work with the worldwide scope that cyber environments provide (Muncie et al. 2010:77). Currently, cybercrime is an extremely profitable business and will no doubt continue to be for a very long time. The main reason for this is because many people are not aware of how rife it is and of how susceptible they are to the threat of this crime. The best possible way that consumers and corporations can protect themselves from cybercrimes and cybercriminal activity is to alert themselves and those around them with the use of awareness campaigns and also, people should make sure that their systems are protected with Anti-Malware and Anti-Virus software kits which have precise virus definition and regular software updates to decrease the risk of being under threat of cybercriminal activity (Microzoneg, 2009). Identity Theft Identity theft is defined as a crime that happens when someone wrongfully gains access to and uses the personal information of another individual in a way that involves fraud or dishonesty. Usually, this crime is carried out in order to gain access to an individuals personal funds. Victims of identity theft normally become aware when they note that they are frequently being charged for items that they never purchased, or when they realise that there has been an opening of a new credit card after viewing their credit reports (Jasper, 2006:1). Annually, 10 million consumers are the victims of identity theft. There are many ways in which cybercriminals can obtain an individuals personal information, and these are generally very cleverly disguised. Criminals can intercept personal information that is freely shared over the Internet and can also easily obtain information such as the victims account details by emailing them and falsely acting as their bank (Jasper, 2006:1-3). Because of the fact that individuals are so afraid that they will fall prey to cybercriminals, at times they do not think rationally when asked for their personal details. When provided the chance of being able to protect themselves, individuals will willingly give all the details needed if the bank requires them to do so. Thus, cybercriminals do not find it immensely difficult to obtain all the beneficial information that they need. Some examples of identity theft crimes are the run-up of costs on the victims credit cards, opening a new credit card account making use of the victims name, birth date and social security number, establishing a telephone or wireless facility using the victims name, opening a bank account and writing bad cheques on the account and obtaining employment by making use of the victims personal identity (Jasper, 2006:3-4). Phishing as a Cybercrime Phishing is a form of identity theft which includes the deceitful endeavour to gain the personal details of an individual with the use of text messages and emails. The criminal will act as the victims bank, for example, and will request personal information from the consumer (such as the PIN number) in order to gain access to the funds in the account. (Ramsamy, 2009) As explained before, the consumer makes it easy for the cybercriminal to gain access to their personal funds and resources as they are so adamant on keeping themselves safe from cybercrime that they very readily give out their information without thinking sensibly. Cases of Cybercrime Over the years, cybercrime has become much more frequent in nature. These cases can be found occurring throughout the world, and will probably continue to occur for a very long time as it is such a profitable business (microzoneg, 2009). Theft of Virtual Characters In the month of November 2009, a man was arrested for stealing virtual characters from a web based role-playing game. The man apparently obtained the log-in information for Runescape, reportedly the worlds largest multi-player online game, to embezzle their virtual characters. The article, published in The Times, states that the man who is from Avon and Somerset Area had already had a number of computer mistreatment offences on his criminal record (Ahmed, 2009). These types of crimes do occur quite often, as a similar case occurred in the Netherlands in 2008. Reportedly, a group of fourteen and fifteen year olds were convicted for the assault of a fellow Runescape player. The boys had threatened the player with a knife, pressuring him to give them a mask and an amulet within the game (Ahmed, 2009). Online gaming seems to be the cause of a lot of recent violent behaviours amongst youth, and the stealing of virtual characters may not seem to be such a tremendous crime, but thinking of all the time and effort that has been put into creating that specific character, this crime shouldnt be, according to Mark Gerhard, the chief executive of Jagex Games, treated differently to the theft of any other valuable possessions (Ahmed, 2009). Credit and Debit Card Information Hackings Another case of cybercrime was highlighted in May 2008, when a Mr Albert Gonzalez was arrested for one of the largest hackings in all of US history. The computer hacker aided with the theft of tens of millions of credit card numbers from major retailers (AP, 2009). He is reportedly going to be spending between 17-25 years behind bars as a result of the seriousness of this criminal offence. Gonzalez did, however, confirm that he had used a number of drugs and consumed large quantities of alcohol preceding his arrest. He admitted to using various narcotics such as marijuana, LSD and cocaine and he has also been said to have behavioural patterns which are very consistent with that of Aspergers Syndrome, which is a form of autism (AP, 2004). According to Dr Barry Roth, a member of the defence commission, Albert was an internet addict who was often associated with awkwardness, had troubles when it came to connecting with people and had an odd fixation with machines and technology in general (AP, 2009). Because drugs and alcohol are so often associated with violent behaviour and aggressiveness, it can be said that they warp the minds of many people and cause them to do things that generally are not expected of them. Since Albert Gonzalez did make use of drugs and alcohol frequently, it could perhaps be said that it caused him to become fixated with technological things and the Internet specifically because it also gave a sense of escaping reality and, since alcohol causes people to believe they can do anything, could have led Albert to believe that he could steal money and still get away with it. With all crimes, the psychological and behavioural background of the offender needs to be taken into consideration. Military Computer Hacking In 2002 a man named Gary McKinnon was arrested for what is described as the greatest military computer hack of all time (The Sunday Times, 2009). McKinnon was allegedly blamed for $700,000 of destruction when he hacked into 97 military computers at the Pentagon and NASA and stole 950 passwords, as well as erased files from the Earle naval armaments post in New Jersey. McKinnon stated in an interview to The Sunday Times that he had not meant for the hackings to seem malicious, but that he was simply curious and wanted to find out information about UFOs. He also openly admitted that he sees himself as a nerd and a loner and that he used to drink beer and smoke dope while hacking into the military systems (The Sunday Times, 2009). This perception of himself could arise from the fact that Gary has Aspergers syndrome. This syndrome does not affect the mental intelligence of the person because the sufferer is in fact very intelligent, but it does leave the sufferer feeling uncomfortable in social situations (The Sunday Times, 2009). This crime could leave Gary McKinnon spending 60 years in prison, which is a very high price to pay for simply being curious. Due to the fact that he has Aspergers syndrome and often resorts to drinking and smoking marijuana, it could be assumed that perhaps these elements wrongfully influenced him to engage in illegal activities, and in addition with his illness could have made matters even worse. Perhaps, due to his loneliness and inability to socialise, he resorted to finding company with the Internet and hacking to gain information that interested him. The Role of Gender in Cybercrime Generally, males are known to display higher rates of abnormal behaviour as compared to females. Although small, the gap between the rates of male and female criminal behaviour is constant. Historically, most forms of crime such as violence, aggressiveness, and freedom of speech were carried out by men, but with the case of cybercrime we cannot simply state that males perform these criminal activities more than females because there is not enough evidence of this; it has not been explored to a very great extent. However, a test done by a few undergraduate students concludes that existing theories of crime may apply similarly to males and females in predicting digital crimes (Morris, 2009:393-404). Criminological Theory Applied to Cybercrime A criminological theory that can be applied to the act of cybercrime is the theory of Routine Activities. This theory states that criminal actions take place when there is an intersection of space and time of a stimulated criminal, a desirable target and an absence of competent supervision (Cullen, 2002). The two important people who were responsible for the proposal of this theory are Larry Cohen and Marcus Felson in 1979. Their theory is very strongly related to that of the Rational Choice theory. This is because both theories concentrate on the features of the crime as opposed to the features of the offender (DeMelo, 1999). The Routine Activities theory states that offences are linked to the nature of everyday patterns of social interaction (DeMelo, 1999). Felson and Cohen believed that changes in society had and is still leading to social disorganisation and thus to broader crime opportunities (DeMelo, 1999). In the cases of the cybercriminals, Albert Gonzalez, Gary McKinnon and the virtual character thief, this criminological theory is applied very well. They had begun their cybercrimes (hackings) with enthusiasm and determination, had found attractive targets to fulfil their desires, and had no one to tell them that it was wrong, illegal and could get them into a lot of trouble. Conclusion Therefore, it is quite clear that cybercrime is a rather serious crime and is continuing to increase in frequency as time goes by and society constantly changes. Also, the nature of these crimes is becoming more and more violent, especially amongst the youth of our world. Societies need to become more self-disciplined, and both offenders and victims need to be more aware of the dangers and consequences of these criminal behaviours, especially phishing and identity theft. Phishing and identity theft as forms of cybercrime can be classified under the Routine Activities criminological theory as they rise in frequency as society changes and a disorganised society opens up greater crime opportunities for offenders. Cybercrimes should not be taken lightly, and if not dealt with correctly, will continue to be on the rise for many years to come. Word Count: 2088

Friday, October 25, 2019

Modern Turkey :: essays research papers

THE REPUBLIC PERIOD Modern Turkish Period (1923-Present) 1923 Establishment of the Turkish Republic with Ataturk as its first president 1924 Abolition of Caliphate 1925-38 Ataturk's program of reforms to modernize Turkey 1938 Death of Ataturk; Ismet Inonu becomes the Republic's second president 1939-45 Despite the alliance with Britain and France, Turkey remains neutral during World War II 1946 Turkey becomes a charter member of United Nations 1950 Turkey enters Korean War as a part of United Nations force; change from a single-party to a multi-party system 1952 Joins the North Atlantic Treaty Organization (NATO) The attempt of the victorious Allies to control the Anatolian territory led to the Turkish War of Independence (1918-23). Following the occupation of Istanbul in 1920 by the British, Italian and French, a Greek army advanced from Izmir deep into Anatolia. While the sultan offered no resistance, under the leadership of Kemal Ataturk, the Turkish Nationalists overturned the postwar settlement embodied in the Treaty of Sà ©vres (1920) and established the Republic of Turkey, formally recognized by the Treaty of Lausanne in 1923. Mustafa Kemal retired his military uniform and inspired the people to an even greater task: Transformation of the country into the democratic, secular Republic of Turkey. Mustafa Kemal Ataturk 1881 Birth of Mustafa in Salonika 1893 Enters Military Secondary School where he is given the name of Kema 1899 Enters War College in Constantinople 1902 Graduates as lieutenant 1905 Posted to 5th Army in Damascus 1907 Posted to 3rd Army in Salonika 1908 "Young Turk" Revolution in Salonika 1911 Posted to General Staff in Constantinople; goes to Tobruk and Derna with Turkish Forces, promoted to Major 1912 Balkan War; severe defeat, returns home 1913 Appointed Military Attachà © in Sofia 1914 Promoted Lieutenant-Colonel; Turkey signs secret alliance with Germany; Russia, Britain and France declare war on Turkey 1915 Appointed to reorganize 9th Division, in Thrace; unsuccessful allied naval attack on Dardanelles; allied military landing at Ariburnu (Anzac); promoted to colonel; appointed to command 16th Army Corps 1916 Allied evacuation of Gallipoli Peninsula; transferred to Caucasus front; promoted to General and Pasa 1917 Returns to Constantinople 1919 Appointed Inspector-General in Anatolia; lands in Samsun; issues "Declaration of Independence" at Amasya; ordered by Government to return; resigns from the army; Nationalist Congress at Sivas and Erzurum; National Pact; new parliament elected; headquarters at Angora 1920 (April 23) First Turkish Grand National Assembly (TGNA) at Ankara 1921 Consecutive battles against different enemies; given title of Gazi and rank of Marshal by TGNA

Thursday, October 24, 2019

Marketing Mix Cafe Coffee Day Essay

The leading coffee chain across the world, Cafe coffee day has several products which appeal to the Indian audience and it has a price which is very much affordable for the upper middle class of India. The promotions are amazing and it has numerous retail outlets which are growing in number across India. This article discusses the marketing mix of Cafe coffee day. Product: Cafà © Coffee Day product mix constitutes a wide range of products that appeal primarily to Indian coffee and snack lovers. Products have a decided Indian taste to it – be it food or coffee. Most of the eatables have been adopted to meet the Indian taste buds like samosa, biryani, masala sandwich, tikka sandwich etc. Thus they have been trying to capture the Indian taste along with classic coffee.The best selling item in summer is frappe, which is coffee and ice cream blended together. The young people favor it. In winter it is cappuccino. Their merchandising includes funky stuff like t-shirts, caps etc. Price: Considering that Cafà © Coffee Day knows its major customer lies in the bracket of 15- 29,it has tried to derive a policy whereby it can satisfy all its customers. The price for a cup of coffee ranges from Rs.45 to Rs 80. From the time it first started its operations, therehas been only minor changes in the pricing policy of Cafà © Coffee Day. The changes havebeen mo re due to the government taxes than any thing else Place: The strategy CCD has adapted is to place a cafe in every possible location where some business can be generated.This is a prime factor in determining the success of a retail chain. Cafà © Coffee Day looks to cater to their target market with strategically located outlets. Their outlets are generally located in High Street/ Family Entertainment Centers, gas stations, near Collegesetc . Promotion: CCD is involved in all the areas of serious consumer passion like: Television:Cafà © Coffee Day held a contest around a very popular programme on Zee English calledFriends. All the six lead characters are shown often visiting a coffee shop.They have tied up with Channel [V]’s Get Gorgeouscontest. Tie-ups:Besides that Cafà © Coffee Day also tie up lot of the youth brands. So they have a contest going on with Levis,another one with Scooty, Liril, latest one with AirtelFriends. Association with movies:CCD can be seen in movies like Khakhee and Mai Hoon Na Sales Promotion:Cafà © Coffee Day uses special ‘Cafà © Citizen Card’ for rewarding Cafà © Coffee Day’s customers. It is a loyalty program to gain new customers and retain the existing ones. Process: The ordering and delivery process in CCD was earlier based on self- service. But now in most its coffee shops the waiter comes and takes away the order and delivers the order on table. Physical evidence: a)Logo , image, brand: Cafà © Coffee Day has used bright red and green colors in its logo. RED stands forleadership , vitality,passion for coffee. The GREEN stroke harks back the coffee plantations that they own.Cafà © is noticeably larger in the logo to denote that Cafà © Coffee Day pioneered thecafà © concept in India way back in 1996.The font looks as though the letters have congealed out of a liquid. b) Architecture and Decor:Largely wood and granite based interior with young colours of today,like limegreen, yellow, orange, and purple predominate. c) Literature:The literature provided by Cafà © Coffee Day is indicative of its youthful image. Themenus, posters, pamphlets are all designed to attract young and young at heart People: People at Cafà © Coffee Day believe that â€Å"People are hired for what they know but fired for how they behave†. Motivation and personal skill are laid emphasize upon. Their employees are like friend to the customer but at the same time th ey know about the international standards of hygiene and cleanliness and personal grooming.

Tuesday, October 22, 2019

How Does Co2 Emissions Affect the Ecosystem?

How does CO2 Emissions Affect the Ecosystem? Kenyetta Sloan Bryant & Stratton College Ecology Dr. M. McLellan-Zabielski October 24, 2012 What would happen if we didn’t cut trees, use transportation, even turn on our lights or any electrical item we own? Then global warming wouldn’t exist. The things that we do on the daily basis is what produces carbon emissions, when we burn oil, coal, and gas, it releases carbon dioxide into the atmosphere. The result of this is climate change, temperature, and moisture, which affects our ecosystem, consisting of plant life and human life.One type of ecosystem is plant life, temperature and moisture influence birth, growth and death rates of plants (Effects on Ecosystems chapter 10). These factors also influence photosynthesis and respiration, which responds differently to temperature, in low temperatures, photosynthesis, is slow, at higher temperatures it accelerates. It is argued that global warming may result in a reduction in net carbon uptake by plants (Woodwell, 1987). Though plants have the ability to adjust to climate change, plants stay in the limited range where they are able to breathe and reproduce.If plants don’t receive enough moisture, it reduces plant growth, if too much moisture then it can cause cellular damage and a rapid increase in respiration (Hanson and Hitz, 1982). Plants absorb carbon, but when it’s burned or when they decay; carbon is released back into our atmosphere, the result being greenhouse gases in the atmosphere. It is a process that carbon goes through or better yet a cycle it goes through, it is cycled from land, to ocean, to air.The ocean contains 50 times more carbon then our atmosphere because it serves as a repository system. Earths current levels of carbon in the atmosphere is something that we should be worried about, the Earth was warmer and sea levels were higher in the past, we’re below the normal averages of where Earth’s levels are suppos ed to be. The blame to this change is us as humans; we are forcing the atmosphere to change, we responsible for the increase of carbon dioxide emissions.Fossil fuels when combusted, contain carbon which bond with oxygen and forms carbon dioxide that enter our atmosphere. The leading fossil fuel is coal, which is used most to form electricity, releases more carbon into the atmosphere than any other fossil fuel we use, even gas doesn’t release as much carbon as coal does. About 40% of fossil fuel combustion is used up by electricity, to power up our homes, businesses and industries, using coal as the primary source of energy (Inventory of U.S. Greenhouse Gas Emissions and Sinks: 1990-2010). Transportation is the second largest source of CO2 emissions, about 31% of fossil fuel combustion is used to transport ourselves and goods. Vehicles, air travel, marine transportation and trains are the sources that we use to transport from place to place, using gasoline or diesel. Carbon Di oxide emissions are projected to grow 1. 5% from now to 2020, there are ways to reduce the emissions, and it’s by cutting our use of fossil fuels.The vehicles we drive can be more fuel-efficient, meaning going green and cutting the gas use, changing our appliances and our electrical usage. References NRC (2010). Advancing the Science of Climate Change. National Research Council. The National Academies Press, Washington, DC, USA. U. S. Department of State (2007). Fourth Climate Action Report to the UN Framework Convention on Climate Change: Projected Greenhouse Gas Emissions. U. S. Department of State, Washington, DC, USA (2010). What Is Carbon Dioxide (CO2)?Understanding the Carbon Cycle & How Current CO2 Emissions are Disrupting It. www. coolerclimate. com Global Biofuels Industry. (2010). M2PressWIRE. www. Thecarbonaccount. com (August 2009). Nature’s role in climate change. European Commission. Effects on Ecosystem. Kaplanovic, S. , & Mijailovtc, R. (2012). THE INTE RNALISATION OF EXTERNAL COSTS OF CO2 AND POLLUTANT EMISSIONS FROM PASSENGER CARS. Technological & Economic Development Of Economy, 18(3), 470-486. doi:10. 3846/20294913. 2012. 702694 .