Tuesday, December 31, 2019

Teen Pregnancy and Graduation Rates - 1175 Words

Teen pregnancy is surprisingly decreasing over the years. According to Farber, â€Å"the most recent studies have shown that there has been a decrease in the rate of pregnancies among all teenagers and among sexually active teenagers (16). Although this issue seems is decreasing this is still a problem faced by many teenage girls today. Each year, 7.5 percent of all 15-19 year old women become pregnant (Maynard 1). Not only does this issue affects the pregnant teen but it also affects the economy. Teen pregnancy affects graduation rates. Many teen mothers cite pregnancy as the key reason of them not finishing school. Only 40 percent of teen mothers finish high school (Teen Pregnancy Affects Graduation Rates). The 60 percent of teen mothers†¦show more content†¦Whichever is the reason they both come with damaging consequences. Emotional damage can lead to far more serious problems. For instance, once a teen loses their virginity to someone they love and they break up it can cause them to feel that their life is over. There have been reports of teens that have attempted or successfully committed suicide. Sexually active teens are more than twice as likely as virgin teens to be depressed or attempt suicide (Fisanick 48). If a pregnant teen commits suicide, she is not only harming herself, but her baby as well. As a product of the teen committing suicide her life is lost and an innocent baby will never see the world. Setting back the rate of teens having sex can also prevent the spread of STDs among adolescents. Teens involved in sexual restraint are most likely aware of the various diseases. Others that are not tend to be the victims of these countless STDs. The side benefit of abstinence is that there is no chance of contracting STDs (Mucciolo 24). The spread of STDs among teens can put them in danger and lead them to death. As of today 4 in 10 sexually active teen girls have had an STD that can cause infertility and even death (Office of Adolescent Health). Catching an STD can also cause emotional damage which as I stated before could result in suicide. The end result of pregnant teen moms causes graduation rates to decrease. Only about two-thirds of children born to teen mothers earn a high school diploma, compared toShow MoreRelatedCrisis in America714 Words   |  3 PagesIn most places and communities, teen pregnancy is a problem. It affects the life of teen girls and teen boys negatively. They can go on to have a good life, but having a child as a teen will reduce your chances of fulfilling your potential. Teen pregnancy is a widespread problem that could be solved if people were more involved. In twenty twelve, there were twenty nine point four births for every one thousand adolescent females ages fifteen through nineteen. That equals out to three hundred thousandRead MoreBirth Control: Available to Teens? Essay647 Words   |  3 Pagespromiscuity, birth control should be accessible to teens because they will put themselves at a higher risk for disease and pregnancy without it, and more teenage girls would get a high school diploma with it. Those who disagree think providing birth control promotes promiscuity and premarital sexual activity. In the article â€Å"At Issue: Birth Control Availability,† the author argues that access to birth control and other contraceptives for teens would make them think their behavior is acceptableRead MoreTeen Pregnancy : The Mom And Child s Well Being, And The Family s Financial Stability814 Words   |  4 Pages Teen Pregnancy Title: Teen Pregnancy Thesis : Teen pregnancy can affect the moms education, the mom and child’s well being, and the family’s financial stability. I : Introduction a : How old was your mom when she got pregnant with you? b : 750,000 girls in America get pregnant each year. c : Teen pregnancy can affect the moms education, the mom and child’s well being, and the family’s financial stability. II : Education a : Only 40% of teen moms graduate High School, andRead MoreIs Stem Education A Stereotype Threat?963 Words   |  4 Pagesengineering and mathematics in an interdisciplinary and applied approach (What Is STEM Education?). The problems that this program will be forcing on are stereotype threat, poverty, English as a second language, and teen pregnancy. Our goal is to help minor these problems and achieve a higher rate of Latina girls join STEM programs after they finish high school. The first problem that we have focused on is the â€Å"stereotype threat†. The stereotype threat is defined as â€Å"A large body of experimental researchRead MoreIncrease High School Graduation Rates Essay1301 Words   |  6 PagesProposal to Increase High School Graduation Rates Did you know that 1.2 million high school students drop out of school every year just in the United States alone (11 Facts)? The decrease of high school graduation rates is a fairly important issue, and there are plenty of reasons to propose a change. According to the U.S. Department of Education, the current standard dropout rate of high school students is 7.4%. High school dropouts encounter way more difficulties and challenges than a high schoolRead MoreTeen Pregnancy Is An Epidemic943 Words   |  4 PagesTeen pregnancy is an epidemic that is destroying the youthfulness of my generation. It does not only separate teenagers from their peers, but it plays a major role in their education and their future. According to SC Campaign to Prevent Teen Pregnancy, â€Å"In South Carolina: 15 teens (age 15-19) give birth every day, 5,532 teens (age 15-19) gave birth in 2012, 26% of SC teens were already teen parents, 73% of all teen births occurred among 18-19 year olds in 2012, 17% of t een pregnancies reported inRead MoreThe Negative Effects of Teen Pregnancy1085 Words   |  5 Pagesteenage fathers will not be in there child’s life. Teen pregnancy is a major social and public health problem in the U.S. Teens have the highest pregnancy rate in the industrial world; 82 percent of the pregnancies were unplanned. Teenagers become pregnant at twice the rate of teens in other industrial countries, including England, Canada, and Wales. The Guttmacher Institute reports that 750,000 teenagers 15 to 19 become pregnant each year. Teen pregnancies are tied to poverty, academic failure, childRead MoreTeen Pregnancy : Education Is A Virtue851 Words   |  4 PagesTeen Pregnancy: Education Is A Virtue Dating back many centuries, teen pregnancy was the cultural norm where women as young as twelve are married off to men to conceive their children. Back then, it was acceptable for young women to bare a child once first menarche and have as many children as her body could bare. In today’s society, teen pregnancy is looked down upon, yet sexual appealing imagery is solicited throughout social media, television networks, magazines, and music. So how is it thatRead MoreEducational Issue Involving Adolescents . Many People Blame1695 Words   |  7 Pagesjudgements, and socioeconomic status. According to a study conducted by Aprile D. Benner, Alaina E. Boyle, and Sydney Sadler, American youth have made major strides in progressing in education in recent years. They also note that high school dropout rates are at an all-time low. In their report, they mention that parental education involvement has been linked to stronger academic outcomes for youth. However, adolescents that come from a low socioeconomic status are at risk for lower performance levelsRead MoreWas That Could Be Scare Us?1281 Words   |  6 PagesScare Us? In March of 2013 the New York State Department of Health and Mental Services released a series of anti-teen pregnancy campaigns in the form posters, which were placed throughout the city via public transportation billboards and social media. By using babies on these posters, which had big yellow strips across them which made them look like warning signs as a way to scare teens from having children early. But, does the use of scare tactics in the form of exaggerated images with the use crying

Monday, December 23, 2019

The dictionary definition of satire is the use of humor,...

The dictionary definition of satire is the use of humor, irony, exaggeration, or ridicule to expose and criticize peoples stupidity or vices. Particularly, in the context of contemporary politics or other topical issues. If one were to examine contemporary culture today they would notice that it is becoming more and more satirized. One could argue this by turning on any program and listening for hidden messages alluding to some cause or political reference. Satire appears in many forms and may be used to shock the reader or targets into changing their behavior. For instance, in Jonathan Swift’s A Modest Proposal he highlighted the poor conditions in Ireland. Additionally he talked about the English and Irish people’s poor approaches†¦show more content†¦Gulliver is a giant and he could kill all the Lilliputians by simply accidentally stepping on them, although this is the case the Lilliputians still think that they can control Gulliver. The first two vices introduced by Swift superiority, and dominance humans think that their bigger than they are, and they also want to control everything. In the Following section the reader meets the giants of Brobdingnag, and the situation is essentially reversed now instead of Gulliver being large, thereby feeling important he is small. Which he feels makes him insignificant to everyone else. In this part of the book by making Gulliver smaller the reader is now able to see how disgusting and self righteous man is. This is seen as Gulliver observes the Brobdingnagians. â€Å"The Queen took up at one mouthful as much as a dozen English farmers could eat at a meal which to me was for some time a very nauseous sight† (Swift 103). Swift not only showed how self-righteous humans can be, but also judgemental. When the king of the Brobdingnagians observed Gulliver he concluded that â€Å"You have clearly proved that ignorance, idleness, and vice may be sometimes the only ingredient for qualifying a legislator; that laws are the best explained, interpreted, and applied by those whose interest and abilities lie in perverting, confounding and eluding them. I cannot, but conclude the bulk of your natives to be the most pernicious race of littleShow MoreRelatedAnalysis Of Aldous Huxley s Brave New World Essay2257 Words   |  10 Pagesman spectating the society. John, a man from the â€Å"savage reservation† (outside the utopia), ventures to their civilization and is disgusted by the lack of humanity expressed by the citizens. *Humanity is a very general term, however my current definition would be common aspects of human nature or culture, including; emotion, curiosity, art, religion, science, etc. â€Å"Linda had been a slave; Linda had died; others should live in freedom, and the world made beautiful...Grief and remorse, compassionRead MoreAnalyzing Satire and Parody in Blazing Saddles Essay2132 Words   |  9 PagesAnalyzing Satire and Parody in Blazing Saddles No one is born a racist bigot. In other words, racial bigotry or racial prejudice is not genetically or biologically determined... Therefore, if most people spoke out about racism, it would be the first step towards a revolutionary change. -Dr. Charles Quist-Adade Mel Brooks’ Blazing Saddles, sheds light to the cultural problems of the Western era through satire with elements of parody within. John Vogel describes Blazing Saddles as â€Å"The UltimateRead MoreANALIZ TEXT INTERPRETATION AND ANALYSIS28843 Words   |  116 Pagesfor they introduce us to information that would otherwise be unavailable and thus increase our knowledge and understanding of present events. Evaluating Plot Having studied a given story or novel, to see how the author has arranged and made us use the elements of plot, we should be ready to evaluate his or her success. The customary test of a plot’s effectiveness is its unity: the degree to which each episode and the place it occupies in the narrative structure of the work bear in some necessary

Sunday, December 15, 2019

Philosophy Report Free Essays

Compare, contrast, and evaluate Plato and Mill on the relation between the individual and society. Two of the greatest minds in intellectual thought, Plato and Mill living in relatively different times, they both shared the same issues and concerns but with very distinct perspectives. Plato believed that freedom was justice in the soul while Mill was defending freedom within a democracy. We will write a custom essay sample on Philosophy Report or any similar topic only for you Order Now Is one freedom better than another freedom? Plato tries to show that individual justice mirrors political justice. He believed that the soul of every individual has a three part structure interchangeable to the three classes of society. Plato, being an idealist, he believed that his philosophers should be impeccable with knowledge. If â€Å"performing abortions† is morally offensive- in a Platonic society that debate wouldn’t happen, because it would be outright outlawed. So how would we know that it isn’t moral? We would never know. And THAT is the kind of suppression Mill disagrees with- isn’t finding out the truth more important than morality? Or is ignorance better than understanding? Mill’s views in the individual and society completely differ from Plato’s. Mill’s view in the individual has the experience and environment that Plato considers unimportant. Mill also believed that a human could develop full potential only by offering the opportunity to define true ability in an individual. He was completely against forcing opinions from one group onto the other. It was doing injustice to the individual. Mill was for the people. He understood society’s struggles when it came to dangerous work stations to where the workers would be paid little to nothing at all. It was an injustice to them to be working so hard and not being appreciated for how hard of an effort workers put into their job. Freedom surely didn’t exist there and Mill strived for that to change. Virtuous and expert rules are possible if and only if the rulers may be philosophers. Plato absolutely believed normal everyday people had no way in becoming a great leader because only intelligence and expertise is only found in Philosophers. He had the perfect picture of an ideal ruler. He also strictly believed one’s abilities portray the certain opportunities given to the philosopher while Mill believed in the complete opposite from that. Each person is naturally suited for a certain task. If you are gifted with intelligence, Plato believes it shouldn’t be put to waste. For example, you are better off being a Doctor than being a construction worker. â€Å"The good city† is possible when â€Å"experts† are in charge of it. Only two worlds existed in Plato’s Theory of the Forms: The visible world and the intelligible world. Knowledge comes down to having knowledge of the forms. You cannot know what is false. Opinion/belief cannot ever be wrong. Knowledge is about what is real or if you have facts to prove whether it’s true or false. Ignorance is separate from pinion but is much clearer than ignorance. It’s part truth, part ignorance. Mill thinks we should be free to do what we want, unless it doesn’t cause harm to society. It would be then, that kind of freedom should be restricted but when can these freedoms be restricted? Should it come to physically harming an individual to their brink of suicide? Physical harm and verbal harm play two different roles in society but I definitely believe are both dangerous. On Liberty, Mill makes funs of Plato that anyone can have an ideal society. Mill also defines justice in a variety of ways before making it into one whole thing. How to cite Philosophy Report, Papers

Friday, December 6, 2019

Testing Process Scenario

Questions: Task 1 The initial part of your proposal should describe the scenario and how your solution applies to the problem. It should specify the overall system to meet the stated requirement.Provide a detailed specification of your solution, including costing and sources. Costing should be researched (for a UK sourcing). It should specify the machine components or sub-systems appropriate to the requirement. Task 2 Describe a testing process to ensure that important specifications and characteristics are met. It should also evaluate the performance of the proposed systemDescribe the Software solution as an overall integrated system, from the organisations point of view, and how it would typically work in practice. It should compare currently available operating systems and suggest how these can be customised. Task 3 A test plan document. This explains your strategy for testing of the hardware and software components before installation.User documentation. This is like an office IT instruction sheet for all staff and users to read. It explains to the user how to use the system.A security policy for your solution. This is your suggested strategy for ensuring system-wide security.A Health and Safety document for the use of the organisation. It should also demonstrate that the system meets health and safety requirements. Answers: 1. Introduction The higher management of Creative Developer Limited is aimed at expanding their business in the near future: this report contains the details of the hardware and software solutions that have been proposed to facilitate the solution. In section 2 (task 1) of the report, the proposed solution along, with its system specifications have been provided. In section 3 (task 2), the process for testing the hardware solution has been discussed along a discussion on various Operating Systems and the software solution that has been proposed. The test plans, the user documentation, the health and security plans and the system security policies to be implemented in the organization have been provided in section 4 of the report. 2.Task 1: Background of the project a.The scenario and the systems solution The organization being considered, Creative Developer Limited or the CDL, is an established software application and web development organization. It had been operating at the Stratford region of London. A current market research undertaken by the representatives of the organization indicate that the number of customers to whom they could serve is increasing steadily (Patterson and Hennessy 2013). The higher management of the organization is thus of the opinion that improving the infrastructure of the organization would help them to optimize the processes of catering to the requirements of target customers (Siewiorek and Swarz 2014). At present, the organization employs 2 developers who design software applications, one designer for the development of graphics applications, 4 developers having expertise in web development and three other developers who are employed for performing miscellaneous development activities. In order to meet the requirements of the organization, the following solutions are being recommended to the management of Creative Developer Limited: Development of an official website or web-portal through which the target customers would be able to communicate with the representatives of the organizations (Patterson and Hennessy 2013). The utilization of cloud based platforms for facilitating the access to application suites useful for the development of software and the web based applications (Wolf 2012). The implementation of a network of the computer system that would be used for the operational activities of the organization, ore specifically for the purpose of graphics designing and development of software and web developments (Siewiorek and Swarz 2014). The website that has been recommended to be implemented in the organization would facilitate the process of branding and promoting the services that Creative Developer Limited is capable of providing to the customers (Sekanina 2012). The website would also allow the representatives of the organization to communicate with their customers, besides providing information on those application or software solutions that have been developed for their customers previously (Hoffmann, Hoffmann and Sllner 2013). On the other hand, the cloud based development platform would allow the designers to gain access to cloud based application development tools, besides facilitating the storage of the designed modules. The utilization of cloud based developmental tools would be useful in reducing a number of investments that the management would have to make for the procurement of such applications, as cloud based platforms allow the users to gain access to such resources on a shared basis and pay as per usage. The cloud based storage would also allow the employees to gain access to files from anywhere and anytime: thus escalating the development process (Wolf 2012). Last but not the least, the development of the network of hi-tech computer devices would increase the efficiency of the operational activities of the organization, along with the inter-organizational communication process. b. Systems specification of the solution being provided The following hardware and software solutions are being recommended to the higher management of Creative Developer Limited: b. i. The hardware devices We recommend the Packard Bell OneTwo M D6020uk All-in-one PC, having a sleek and sophistic design, to be installed in Creative Developer Limited. This desktop personal computer is installed with the latest Windows 7 Operating software and would be easier to install in the office cubicles as the model has been specifically designed for fitting into small desk spaces (Mller and Paul 2013). The specifications of this desktop PC have been provided in the following section: The Microprocessor Type of processor Intel Pentium Dual-Core T4300 processor Memory Clock Speed (RAM) 800MHz FSB (Computerhope.com 2016). L2 Cache 2MB (Encarnacao, Lindner and Schlechtendahl 2012). Chipset Intel Graphics Media Accelerator 4500 M Clock Speed (Processor) 2.1GHz The Screen Size 20 inch Screen resolution 1600x900 Technology TOUCH PANEL Contrast ratio: 1000:1 (Computerhope.com 2016). The Sound system Type Integrated on the PCI Slot ( that is the motherboard) Speaker Type Stereo speakers The Memory Type Capacity: 3GB, DDR2 memory (Encarnacao, Lindner and Schlechtendahl 2012). (RAM) 800MHz FSB The Hard Drive 1 TB Hard Drive HDD rotation speed (Manna and Pnueli, 2012). 7200rpm, Type: SATA The Operating System The preloaded Genuine Windows 7 (Hatley and Pirbhai 2013). Operating System type 64-bits The Peripherals a. DVD Rewriter b. Built-in wireless (802.11b/g/n) c. Integrated Graphics d. Digital TV Tuner (Hatley and Pirbhai 2013). Card reader 5 in 1 ( supports :,SD, xD, SD HC, MS Pro,MS, MMC) Optical drive TRAY SUPER MULTI DVDRW (Siewiorek and Swarz 2014). At present, the market price of this hardware would be around 379.00 (Packard Bell 2016). This particular hardware set has been recommended as the hardware specifications of the machine indicate that the software applications required for the operational activities of the organization would be well supported. Besides this, the manufactures have incorporated enough RAM facility to run the basic web application development tools like that of Adobe Photoshop, Microsoft Visio, and Dreamweaver. b. ii. The cloud based development platform Several cloud platforms are available these days which can be used solely for the purpose developing software applications (Valilai and Houshmand 2013). Utilizing such tools do not require any particular hardware specification and the costs of these services vary greatly based on the products being used and the extent of usage. b. iii. The web-portal The system specification of the website that would be designed for Creative Developer Limited has been provided in the following table: At present, developing an efficient website containing the above mentioned features would require an investment of around 35,000 approximately.b. iii. The web based communication toolIn this section of the report, the system specifications, that is, the features and utilities of the web based communication tool, have been discussed in brief. The features have been decided based on the requirements of the client and include the following: Supported by all leading Operating Systems, like that of Windows, iPhone, Android, etc. Designed for supporting instant messaging and video calling features (Biltoftà ¢Ã¢â€š ¬Ã‚ Jensen et al. 2014). Would support group and point to point conference calls. Designed for cumulative call transfer facilities (Dmoz.org 2016). Would provide access to all local contacts instantly and contact lists would be updated with new contacts automatically (Linsley 2014). It is expected that the development of the customized web application tool and its installation in the computing devices utilized by the employees of Creative Developer Limited would cost 10000.00 approximately.3. Task 2:a. Testing process for the hardware systemIn this section of the report, we provide the details of the testing procedures that should be utilized to estimate the efficiency of the designed system before it is commissioned.It is worth mentioning that the testing process should be conducted before finalizing the vendor and the model of the computing devices to be installed in an organization. Besides this, the availability of the specific requirements of the client helps in estimating the efficiency of any ICT system supported by the said hardware system (Maddox 2015).In general, the following testing processes are utilized for hardware testing:Physical inspection: The physical inspection of the hardware systems should include an inspection of the following features (N eumann 2011):The quality of the construction of the machines: The computing devices that are being provided to the employees of Creative Developer Limited should be of strong and solid build, such that they able to withstand the high usage to be made (Brjesson and Feldt 2012 ). Thus, the quality of the construction of the hardware products, including the placement of the various switches and ports should be checked (Polian 2014).The physical design: The design and the layout of the machines need to be through tested in order to make sure that the following systems are well designed and built:the airflow and the cooling systems (Gross, Fraser and Zeller 2012 ).The condition of the switches, pins, jacks and ports included in the hardware setup (Leigh et al. 2014).iii. The built, design and the rigidity of the cases (Kolawa et al. 2013).The fitting of the various subparts (Raman 2012).the ease with which the various parts of the machines can be replaced during the servicing process: as for example, unscrewing and re-screwing a large number of tiny bolts would essentially slow down the servicing process when a large number of machine parts need to be replaced. Thus, models having such specifications should not be considered by the IT team of Creative Developer Limited (Brjesson and Feldt 2012 ).Last but not the least the power supply components of the computer hardware need to be checked for their efficiency and quality(Spichkova, Schmidt and Peake 2014).Testing using software: Apart from the above mentioned physical testing process, invoking software base stress testing is also encouraged so as to detect the faulty hardware systems (Kuo, Chien, and Kim 2013). Several software bundles are available on the market that can be utilized for stress testing various hardware components, like that of Prime95 for stress testing CPUs, MemTest86+ for testing the RAM, FurMark for testing the GPU and so on and so forth ( Feitelson 2015).b. The software solutionIn this section of the report, we provide the details of the software solutions that are being designed for the Creative Developer Limited so as to assist them in their business expansion.i. The software system being developedIn order to assist Creative Developer Limited to expand their business and cater to the requirements of the ever increasing customer base, we have emphasized on the processes which would be utilized for communicating with the said clients (Wang and Tao 2012). Thus, it has been decided that an efficient official website of the organization would be developed, which would help the process of marketing and branding for the organization (Valacich 2012 ). Information regarding the services offered by the Creative Developer Limited and glimpses of the products that have been custom made for other clients. Customers would also be able to communicate with the representatives of the organization and those who express their interests in using the facilities, would be encouraged to creat e customer profiles by submitting their personal details on the portal (Johnson 2015 ). These customer profiles would eventually lead to the generation of unique customer ids which in turn would facilitate the process of post sales customer services.Besides this, a web based communication tool would be custom designed for Creative Developer Limited. It has already been mentioned that the customer base to which the organization could provide services to is steadily increasing and that the organization has plans for future expansions. Thus, the web based communication tool would facilitate collaborative work between teams located in separate locations (Wheeler 2013). Thus, it can be said that the proposed software system would only help the organization to cater to the needs of their newly found customers by would also help the employees through the application development processes.ii. Currently available operating systemsAt present, the following types of operating systems are readi ly available in the market.Real time operating systems: A RTOS or real time operating system that has been custom designed to support applications that generate data in real time (Lister 2013). Needles to say, these multitasking operating systems are suitable for supporting embedded systems like devices used for controlling household appliances, programmable thermostats, robots used in various industries, equipment utilized in scientific research, etc.Examples of a real time operating system are VxWorks, RTLinux, QNX,etc.Single User, Single Tasking Operating Systems: As the name suggest, such operating systems allow a single task from a single user to run at a time. The operating systems installed in the palm held devices are examples of single user single tasking OS ( Tsichritzis and Bernstein 2014).Single User, Multi Tasking Operating Systems:As suggested by the description of the OS, such operating systems allow several applications from a single user to run simultaneously. Most of the computing devices and the laptops that awe use today run on such Operating Systems (Stallings 2013).The Microsoft built Windows OS; Mac built OS X, and Linux are some of the most commonly used Single User Multi Tasking Operating Systems ( Tsichritzis and Bernstein 2014).Multi user operating system:A multi user OS allows various applications from numerous users to operate simultaneously. The OS itself makes sure that resources demanded by these applications are available and schedules them accordingly (Hansen 2013).Unix servers are the most commonly utilized Multi user operating systems.As mentioned in Task 1, the application utilized by the employees of Creative Developer Limited would be well supported by Windows 7: thus, this particular OS would be utilized. However, it is worth mentioning that most of the single multi tasking operating system allow the users to perform a wide range of customization and personalization: a facility that is not available with the other types of OSs (Lister 2013).4. Task 3:a. The test plans document In this section of the report, we provide a brief description of the various tests that have to be performed before the hardware and software systems are incorporated into the operational activities of Creative Developer Limited.Testing the hardware:Tests should be conducted so as to make sure that the operating system boots properly and that the OS provides a smooth run (Chupilko 2012).The applications like Adobe Photoshop and Dreamweaver are considered to be RAM hungry applications: thus simultaneous utilization of these applications would be useful in assessing the quality of the RAM (Ece.uprm.edu 2016).Writing and compiling codes in the above mentioned applications, besides making attempts to upload or down load information from the internet and utilizing the FTP services, would be helpful in testing the efficiency of the processor (Hardware Software Co-Design for JPEG Encoder Test Bench 2012). The computer hardware being tested could be considered to be highly efficient if no lagging or crashing of the system is reported during the above mentioned test procedures (Martin 2011).Testing the software: The following components of the proposed software solution need to be tested before installation:UI testing: The user interfaces of the website and the communication tool (Denton, Moody and Bennett 2016).Data base integrity testing: The database systems running at the back end of the website (Mahmud, Cypher, Haber and Lau 2012)Performance testing:The links that the help the users to move from one part of the website to the other.The response time of the said applications.Load Testing: Testing the efficiency and the performance of the website and the web based communication tool when a large number of users are logged in to the systems (Goebel 2016).Security Testing: Verifying the mechanisms that that user would utilize for logging in to the system or accessing the data stored in the enterprise databases (Sce.uhcl.edu 2016).b. User documentationA user document is generated by the ICT consultancy so as to provide useful information to the end users of an ICT system. In this section of the report, an insight to the user documentation custom designed for Creative Developer Limited has been provided.Getting started: The website that has been developed would contain the following pages:The home page (Hindmarsh and Serban 2012).Our servicesOur clientsProducts designed by usGet to know usContact usThe site mapCommunication with the client would be feasible by the utilization of the web based communication application that is embedded in the website.Getting accessIn order to utilize the web based communication tool, you have to log in to the web portal using the password and id provided by the system administrator (Tolman et al. 2014). Domain name (Proposed) www. creativedevelopers.com (Wahab et al. 2014). Search engine optimization Accessible to all leading search engines (Goh et al. 2013) List of web pages 1. The home page 2. Our services 3. Our clients 4. Products designed by us 5. Get to know us (Uruea, Muoz and Larrabeiti 2014). 6. Contact us 7. The site map Layout and style The layout Uniform layout containing the official logo of the organization Navigation Common navigation bar for all web pages (Linsley 2014). Other requirements Accessibility Complies with accessibility criteria mentioned in the World Wide Web Consortium Web Accessibility Initiative or the W3C WAI level A Guidelines (Valilai and Houshmand 2013). Code Validation All codes would be validated according to the World Wide Web Consortium or the W3C specifications (de Castro Salgado, Leito and de Souza 2013). In case you forget your password or id, please contact your system administrator. iii. Utilizing the communication tool: Add contacts: New contacts would be automatically added to your contact list, as and when you refresh the tool. Searching contacts: Contacts present in your list can be searched using their first names or by using the employee ids (Earle, Rosso and Alexander 2015 ). Making calls: When you select a specific contact, you would be provided with various call options to choose from. Making conference calls: In order to conduct conference calls, you have to select a contact while being on a call with someone else, using the instructions provided above. The call options would be displayed, chose the one you are currently using. In case your contact responses to the call, a conference call would be set up. c. Security policy In this section of the report, we provide a brief description of the security policies that need to be implemented by the higher management of Creative Developer Limited. Password policy: All system level passwords are to be managed by the IT administrator. The employees would not be allowed to create passwords of their own (Ifinedo 2012). All the passwords being used for increasing the level of security of the said computer system should be maintained in the global password database of the organization. All user level passwords including those utilized to access emails and data base information must be changed periodically. Information security policy: The system should reduce the storage of sensitive client information to the minimum levels. The access to such sensitive information must be controlled by the IT administrator (Safa, Von Solms and Furnell 2016). The employees of the organization would not be allowed to make copies of the enterprise information in their personal detachable devices, nor would they be able to send any attachments through emails, while using the network provided by the organization. Antivirus policy: Corporate standard anti-virus programs should be used for ensuring the security of the hardware components of the computing devices and that of the enterprise information stored in these machines (Vance and Siponen 2012). The anti-virus programs should be downloaded from the official sites and be updated on a regular basis. The employees of the organization should be repeatedly made aware of the fact that an email sent from an unknown source might actually be sent with malicious intents: thus, they should not download or open any attachment sent by unknown ids (Safa, Von Solms and Furnell 2016). Policies For Acceptable Usage: It is expected that the management of Creative Developer Limited would provide up to a certain level of privacy to the employees of the organization in terms of information generation and usage: however, it must be made clear to the employees that the data or the information that are generated using the corporate computer network provided by the organization are to be considered as the intellectual properties of the organization itself (Siponen and Vance 2014). The higher management of the organization would have the right to conduct audits of the computer systems and networks used by employees so as to ensure that the above mentioned policies are being abided by (Ifinedo 2012). d. A Health and Safety document In this section of the report, we provide a brief detail of the Health and Safety policies that must be implemented by the higher management of Creative Developer Limited. The employees of the organization must be made aware of the fact that they should not bring in any edible material, like foods or drinks, in the work stations. This particular policy would be useful in avoiding spilling of food material on the computer devices which might even lead to short circuits (Lundgren and McMakin 2013). All the live or open wires within the work floor areas must be concealed within insulator material, and the employees should immediately inform the concerned authorities in case live and/ or open wires are noticed (ONeill et al. 2013). The computer devices being used by the employees should not be subjected to direct heat, smoke or moisture (Ab.ust.hk 2016). In case of any servicing work, the following rules are to be followed: Before servicing any machine, all the wires or connectors supplying power to the system must be unplugged (Sitesafe.org.nz 2016). Additional care must be taken when the employees attempt to work with electric switches. All cables should be unplugged if the employees need the access in to the CPU cabinet (Safeworkaustralia.gov.au 2016). 5. Recommendations In the light of the discussion made in the report, the following recommendations are being provided to the higher management of the Creative Developer Limited: In spite of the fact that the development and the implementation of the proposed solutions would require the management to invest a hefty amount, yet the management should opt for the installation as the proposed systems would increase the efficiency of the operational activities of the organization. The higher management of the organization should implement a detailed security policy in the organization in order to secure the enterprise data. Strict health and safety policies must also be implemented so as to avoid fatal mishaps or accidents. The testing plans provided in the report should be followed before the incorporation of the proposed solutions within the operational activities of the organization. References Ab.ust.hk,. 2016. Setting a health and safety policy. Ab.ust.hk. Retrieved 27 January 2016, from https://www.ab.ust.hk/hseo/Dhsmr/sample.htm Biltoftà ¢Ã¢â€š ¬Ã‚ Jensen, A., Trolle, E., Christensen, T., Islam, N., Andersen, L. F., Egenfeldtà ¢Ã¢â€š ¬Ã‚ Nielsen, S., and Tetens, I. 2014. WebDASC: a webà ¢Ã¢â€š ¬Ã‚ based dietary assessment software for 811à ¢Ã¢â€š ¬Ã‚ yearà ¢Ã¢â€š ¬Ã‚ old Danish children.Journal of Human Nutrition and Dietetics,27(s1), 43-53. Brjesson, E., and Feldt, R. 2012, April. Automated system testing using visual GUI testing tools: A comparative study in industry. InSoftware Testing, Verification and Validation (ICST) 2012 IEEE Fifth International Conference on(pp. 350-359). IEEE. Chupilko, M. 2012. Developing test systems for multi-modules hardware designs. Programming And Computer Software, 38(1), 34-42. https://dx.doi.org/10.1134/s036176881201001x Computerhope.com,. 2016. How can I test for hardware failures in my computer?. Computerhope.com. Retrieved 27 January 2016, from https://www.computerhope.com/issues/ch001088.htm De Castro Salgado, L. C., Leito, C. F., and de Souza, C. S. 2013. A Case Study: Re-designing the AVIS Website. InA Journey Through Cultures(pp. 69-114). Springer London. Denton, A., Moody, D., and Bennett, J. 2016. Usability Testing as a Method to Refine a Health Sciences Library Website. Medical Reference Services Quarterly, 35(1), 1-15. https://dx.doi.org/10.1080/02763869.2016.1117280 Dmoz.org,. 2016. DMOZ - Computers: Security: Policy: Sample Policies. Dmoz.org. Retrieved 27 January 2016, from https://www.dmoz.org/Computers/Security/Policy/Sample_Policies/ Earle, R. H., Rosso, M. A., and Alexander, K. E. 2015, July. User preferences of software documentation genres. InProceedings of the 33rd Annual International Conference on the Design of Communication(p. 46). ACM. Ece.uprm.edu,. 2016. Test plan. Retrieved 27 January 2016, from https://ece.uprm.edu/~icom5047/documents/OtherDocuments/TestPlan.pdf Encarnacao, J. L., Lindner, R., and Schlechtendahl, E. G. 2012.Computer aided design: fundamentals and system architectures. Springer Science and Business Media. Feitelson, D. G. 2015.Workload modeling for computer systems performance evaluation. Cambridge University Press. Goebel, J. 2016. Hardware Testing and System Qualification: Procedures to Evaluate Commodity Hardware and Production Cluster. Retrieved 27 January 2016, from https://www.slac.stanford.edu/cgi-wrap/getdoc/slac-pub-9761.pdf Goh, K. N., Chen, Y. Y., Daud, S. C., Sivaji, A., and Soo, S. T. 2013. Designing a Checklist for an E-Commerce Website Using Kansei Engineering. InAdvances in Visual Informatics(pp. 483-496). Springer International Publishing. Gross, F., Fraser, G., and Zeller, A. 2012, June. EXSYST: search-based GUI testing. InProceedings of the 34th International Conference on Software Engineering(pp. 1423-1426). IEEE Press. Hansen, P. B. (Ed.). 2013.Classic operating systems: from batch processing to distributed systems. Springer Science and Business Media. Hardware Software Co-Design for JPEG Encoder Test Bench. 2012. INTERNATIONAL JOURNAL ON Advances In Information Sciences And Service Sciences, 4(2), 258-266. https://dx.doi.org/10.4156/aiss.vol4.issue2.32 Hatley, D., and Pirbhai, I. 2013.Strategies for real-time system specification. Addison-Wesley. Hindmarsh, A. C., and Serban, R. 2012. User Documentation for cvodes v2. 7.0. Hoffmann, A., Hoffmann, H., and Sllner, M. 2013, June. Fostering initial trust in applicationsdeveloping and evaluating requirement patterns for application websites. In21st European Conference on Information Systems (ECIS), Utrecht, The Netherlands. Ifinedo, P. 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.Computers and Security,31(1), 83-95. Johnson, J. A. 2015, April. Designing Websites for Adults 55+: Toward Universal Design. InProceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems(pp. 2449-2450). ACM. Kolawa, A. K., Jakubiak, N. M., Lambert, M. L., Haaker, W., and Gandhi, N. 2013.U.S. Patent No. 8,448,148. Washington, DC: U.S. Patent and Trademark Office. Kuo, W., Chien, W. T. K., and Kim, T. 2013.Reliability, Yield, and Stress Burn-in: A Unified Approach for Microelectronics Systems Manufacturing and Software Development. Springer Science and Business Media. Leigh, Darren, Clifton Forlines, Daniel Wigdor, and Steven Leonard Sanders. "Latency measuring and testing system and method." U.S. Patent Application 14/316,177, filed June 26 2014. Linsley, P. 2014.U.S. Patent No. 8,713,172. Washington, DC: U.S. Patent and Trademark Office. Lister, A. 2013.Fundamentals of operating systems. Springer Science and Business Media. Lundgren, R. E., and McMakin, A. H. 2013.Risk communication: A handbook for communicating environmental, safety, and health risks. John Wiley and Sons. Maddox, P. 2015. Testing a distributed system.Queue,13(7), 10. Mahmud, J., Cypher, A., Haber, E., and Lau, T. 2012. Design and industrial evaluation of a tool supporting semi-automated website testing. Software Testing, Verification And Reliability, 24(1), 61-82. https://dx.doi.org/10.1002/stvr.1484 Manna, Z., and Pnueli, A. 2012.The temporal logic of reactive and concurrent systems: Specification. Springer Science and Business Media. Martin, G. 2011. Will hardware and software be codesigned? [review of "A Practical Introduction to Hardware/Software Codesign" (Schaumont, P.R.; 2010)]. IEEE Design and Test Of Computers, 28(2), 70-73. https://dx.doi.org/10.1109/mdt.2011.41 Mller, S. M., and Paul, W. J. 2013.Computer architecture: complexity and correctness. Springer Science and Business Media. Neumann, T. 2011. Efficiently compiling efficient query plans for modern hardware. Proc. VLDB Endow., 4(9), 539-550. ONeill, S., Martinov-Bennie, N., Cheung, A., and Wolfe, K. 2013. Issues in the measurement and reporting of work health and safety performance: a review.Safe Work Australia, Safety Institute of Australia and CPA Australia. Packard bell,. 2016. Retrieved 27 January 2016, from Packard bell: https://www.pcworld.co.uk/gbuk/packard-bell-computing/desktop-pcs/desktop-pcs/1093_8225_71255_1698_xx/xx-criteria.html https://www.algoworks.com/ Patterson, D. A., and Hennessy, J. L. 2013.Computer organization and design: the hardware/software interface. Newnes. Polian, I. 2014. Hardware security and test: Friends or enemies?. It - Information Technology, 56(4). Raman, A. 2012. Universal Analog Hardware Test Bench. IETE Journal Of Education, 53(2), 89-96. Safa, N. S., Von Solms, R., and Furnell, S. 2016. Information security policy compliance model in organizations.computers and security,56, 70-82. Safeworkaustralia.gov.au,. 2016. Home - Safe Work Australia. Safeworkaustralia.gov.au. Retrieved 27 January 2016, from https://www.safeworkaustralia.gov.au/sites/.../organisation-needs-organsations Sce.uhcl.edu,. 2016. Example: Test Plan. Sce.uhcl.edu. Retrieved 27 January 2016, from https://sce.uhcl.edu/helm/RUP_course_example/courseregistrationproject/artifacts/test/plans/test_plan_arch.htm Sekanina, L. 2012.Evolvable components: from theory to hardware implementations. Springer Science and Business Media. Siewiorek, D., and Swarz, R. 2014.Reliable Computer Systems: Design and Evaluatuion. Digital Press. Siponen, M., and Vance, A. 2014. Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.European Journal of Information Systems,23(3), 289-305. Sitesafe.org.nz,. 2016. Health and safety policy Retrieved 27 January 2016, from https://www.sitesafe.org.nz/Category?Action=ViewandCategory_id.. Spichkova, M., Schmidt, H., and Peake, I. 2014. From abstract modelling to remote cyber-physical integration/interoperability testing.arXiv preprint arXiv:1403.1005. Stallings, W. 2013.Operating Systems: Internals and Design Principles: International Edition. Pearson Higher Ed. Tolman, H., Accensi, M., Alves, H., Ardhuin, F., Bidlot, J., Booij, N., ... and Foreman, M. 2014. User manual and system documentation of Wavewatch III version 4.18. Tsichritzis, D. C., and Bernstein, P. A. 2014.Operating systems. Academic Press. Uruea, M., Muoz, A., and Larrabeiti, D. 2014. Analysis of privacy vulnerabilities in single sign-on mechanisms for multimedia websites.Multimedia Tools and Applications,68(1), 159-176. Valacich, J. S. (2012, June). Designing effective web sites: How academic research influences practice. InInformation Technology Interfaces (ITI), Proceedings of the ITI 2012 34th International Conference on(pp. 15-20). IEEE. Valilai, O. F., and Houshmand, M. 2013. A collaborative and integrated platform to support distributed manufacturing system using a service-oriented approach based on cloud computing paradigm.Robotics and computer-integrated manufacturing,29(1), 110-127. Vance, A., and Siponen, M. T. 2012. IS security policy violations: a rational choice perspective.Journal of Organizational and End User Computing (JOEUC),24(1), 21-41. Wahab, A. A., Ahmad, F., Baharom, F., and Yahaya, J. 2014. A case study of quality evaluation from consumers perspectives on Malaysian B2C e-commerce websites.Management and Technology in Knowledge, Service, Tourism and Hospitality, 19. Wang, N., and Tao, T. 2012. Designing and Implementation of Audio Product Sales Website. InInformation and Business Intelligence(pp. 349-356). Springer Berlin Heidelberg. Wheeler, A. 2013. Designing brand identity. Wolf, M. 2012.Computers as components: principles of embedded computing system design. Elsevier.