Wednesday, July 31, 2019

Heat Capacity Ratio of Gases

Experiment 1 The Heat Capacity Ratio of Gases Purpose The purpose of this experiment is to calculate the heat capacity ratio of gases, Helium, Nitrogen and Carbon Dioxide, and compare with their theoretical values. Introduction Thermodynamics is the study of heat as it relates to energy and work. There are various properties which all relate to each other when determining the characteristic of a certain substance.One of such properties is heat capacity, which is the amount of heat energy required to raise the temperature of a substance by one degree Kelvin. Mathematically, it is ? = q? T , where q is the amount of heat absorbed by a substance and ? T is the change in temperature measured. When substances absorb heat, their molecules translate, rotate and vibrate due to the rise in temperature . As a result of the motion of movement of molecules in these modes, there is a contribution of energy towards determining the heat capacity of that substance.The heat capacity is, however, defi ned through constant volume (Cv) or constant pressure (Cp) with a relationship, Cp = Cv + nR and CpCv , the heat capacity ratio for ideal gases which is further determined by obtaining the pressure difference with atomospheric pressure in adiabatic conditions. That is lnp1-lnp2lnp1-lnp3. The energy contribution through the modes of movement of molecules is the total of their, translational, rotational and vibrational energies. For ideal gases, this can be calculated theoretically as a result of their classes, Monatomic, Diatomic and Linear polyatomic.Monatomic gases such as Helium, move in translation with the energy 32RT. Diatomic gases such as Nitrogen, move in all 3 modes with the energy 72RT. And the linear polyatomic gases such as CO2 move with the energy 132RT. The constant volume heat capacity for these ideal gases can be determined as a result of its relationship with these energies as the energy U = nRT and Cv is the derivative with respect to volume. i. e Cv = ? U? Tv . Th is leads to the following Cv for the 3 classes of gases; 12. 5 Jmol*K for monatomic, 29.1 Jmol*K for diatomic, and 54. 0 Jmol*K for linear polyatomic. Data Room Temperature = 16. 2 oC  ± 0. oC p2 = Room Pressure Room Pressure = 760. 84 mmHg  ± 0. 22 mmHg Helium Trial| P1 (mmHg)( ±0. 3)| P3 (mmHg)( ±0. 3)| 1| 300. 4| 75. 6| 2| 275. 7| 69. 0| 3| 281. 9| 74. 8| Carbon Dioxide Trial| P1 (mmHg)( ±0. 3)| P3 (mmHg)( ±0. 3)| 1| 290. 3| 34. 1| 2| 277. 8| 25. 3| 3| 283. 1| 40. 1| The values for Helium and Carbon dioxide were gotten from the other group who performed the experiment. Nitrogen Trial| P1 (mmHg)( ±0. 3)| P3 (mmHg)( ±0. 3)| 1| 278. 7| 63. 7| 2| 286. 6| 89. 7| 3| 270. 5| 58. 9| 4| 294. 2| 85. 0| 5| 285. 5| 89. 7| 6| 291. 4| 70. 0| 7| 268. 1| 54. 1| 8| 289. 0| 64. 8| 9| 281. 5| 65. 8| 10| 265. 3| 59. 7|Values in bold are the 3 best trial obtained. Answers to Questions 1) C, mathematical defined as C = q? T , is the heat capacity, the amount of energy required to raise the temperature of a substance by one degree Kelvin. Cv, is the heat capacity per unit volume while, Cp , is the heat capacity per unit pressure. Both are related mathematically by the equation Cp = Cv + nR. The expected heat capacity for the three classes of gases are as follows Monatomic = 3R2=12. 5 Jmol. K Diatomic = 7R2=29. 1 Jmol. K Linear triatomic = 13R2=54. 0 Jmol. K The equations leading to the heat capacity ratio, ? , is summarized by CpCv= ln(p1p2)ln? p1p3) The vibrational contribution to Cv can be determined once the vibrational frequencies of the molecule is known. That is Rx2e-x where is x>5 . x = (NA hRT)v Where NA = Avogadro's number, h = Planck's constant and v = vibration frequency.2) Data obtained in the experiment is presented in the data section above. 3) Sample error calculation 2300. 42*0. 32+760. 842*0. 222 =817. 9962127 2817. 99621271061. 242+0. 22760. 842 = 0. 770793 275. 62*0. 32+760. 842*0. 222 =168. 9143383 2817. 99621271061. 242+168. 9143383836. 442 = 0. 79681 0. 7707931. 39482677 = 0. 55261 0. 796811. 26875807 = 0. 6280336 20. 552610. 327702282+0. 62803361. 268758072 = 3. 12 This was applied to calculate all errors in the heat capacity ratios below. Helium Trial| ? = ln(p1p2)ln? (p1p3)| Error| 1| ln(300. 4+760. 84760. 84)ln? (300. 4+760. 8475. 6+760. 84) = 1. 40|  ± 3. 12| 2| ln(275. 7+760. 84760. 84)ln? (275. 7+760. 8469. 0+760. 84) = 1. 39|  ± 3. 12| 3| ln(281. 9+760. 84760. 84)ln? (281. 9+760. 8474. 8+760. 84) = 1. 43|  ± 3. 12| Carbon Dioxide Trial| ? = ln(p1p2)ln? (p1p3)| Error| 1| ln(290. 3+760. 84760. 84)ln? (290. 3+760. 8434. 1+760. 84) = 1. 16|  ±3. 08| 2| ln(277. 8+760. 84760. 84)ln? (277. 8+760. 8425. 3+760. 84) = 1. 12|  ± 3. 07| 3| ln(283. +760. 84760. 84)ln? (283. 1+760. 8440. 1+760. 84) = 1. 19|  ±3. 08| Nitrogen Trial| ? = ln(p1p2)ln? (p1p3)|Error| 1| ln(278. 7+760. 84760. 84)ln? (278. 7+760. 8463. 7+760. 84) = 1. 35|  ± 3. 11| 2| ln(289. 0+760. 84760. 84)ln? (289. 0+760. 8464. 8+760. 84) = 1. 34| à ‚ ± 3. 11| 3| ln(265. 3+760. 84760. 84)ln? (265. 3+760. 8459. 7+760. 84) = 1. 34|  ± 3. 11| 4) Theoretical Cv for CO2 Translation = 3R2 = 3*8. 3142 = 12. 471 Jmol*K Rotational =22 R = 8. 314 Jmol*K Vibrational v1 = 4. 02 x 1013 s x = NA hRTv = 6. 02 x 1023*6. 63 x 10-348. 314*2984. 02 x 1013 = 6. 48 Therefore contribution = 8. 314(6. 48)2 * e-6. 48 =0. 54 Jmol*K 3 = 7. 05 x 1013 s x = NA hRTv = 6. 02 x 1023*6. 63 x 10-348. 314*298 7. 05 x 1013 = 11. 36 therefore contribution = 8. 314(11. 36)2 * e-11. 36 = 0. 013 Jmol*K v2 = v4 = 2. 00 x 1013 x = NA hRTv = 6. 02 x 1023*6. 63 x 10-348. 314*298 2. 00 x 1013 = 3. 22 This is less than 5. therefore contribution = 8. 314* 3. 222 *e3. 22e3. 22 -12 = 3. 74Jmol*K Cv for CO2 = 12. 471 +8. 314 +0. 54 +0. 013 + 2(3. 74) = 28. 818 = 29. 0 Jmol*K 5) Cp,m = Cv,m + R so Cv,m = RCp,mCv,m- 1 Average experimental ? CO2 = 1. 16+1. 12+1. 193 = 1. 16 Therefore Experimental Cv,m = 8. 3141. 16 – 1 = 51. 96 = 52. 0 JK While Theoretical Cv,m = 8. 141 . 29-1 = 28. 67 = 29. 0 JK Percentage error = 29 -5229*100 = 79% 6) Experimental ratio were precise but not accurate to the theoretical values as calculated Gas| Average ratio| Percentage error (%)| Helium| 1. 40+1. 39+1. 433 = 1. 41| 1. 67-1. 411. 67*100 = 15. 57| Nitrogen| 1. 34+1. 34+1. 353 = 1. 34| 1. 40-1. 341. 40*100 = 4. 29| Carbon dioxide| 1. 16+1. 12+1. 193 =1. 16| 1. 29-1. 161. 29*100 = 10. 08| Sources of experimental errors would include; leakage through the hose connecting the gas cylinder to the adiabatic vessel and the speed with which the brass cover plate is replaced after the gas expansion.The vibrational contribution to Cv is very much dependent on the temperature. At low temperature, the contribution is zero. As the temperature increases, the lowest vibrational energy is comparable to RT and therefore some contribution to the constant volume heat capacity. While at high temperatures the contribution is at its highest. Conclusion The experiment was successful as th e heat capacity ratios were achieved to minimal errors from the theoretical values. Reference 1. Thomas Engel, Physical Chemistry, 2nd Edition, Prentice Hall, 2010, pg 21-22, 806 – 807. 2. Lab manual for Chem 2103, experiment 1. 3. Tip for Experiment 1 on CUlearn.

Tuesday, July 30, 2019

Generally Accepted Accounting Principles Essay

Although dropping slightly the second year they have managed to improve this in their third year increasing their overall profitability Safety Styles has also increased both its Return on Assets and Return on Equity, this demonstrates the ability of the company to efficiently make use of its assets and equity which ultimately reduces requirements for more funding and reduces cost making better use of what they currently have. Efficiency: Safety Styles Pty Ltd appears on average over the last three years to be improving its efficiency to make better use of their assets and turning over their inventory. Safety should also focus on this area and strive to improve their efficiency. Whilst the values may seem quiet higher their total sales amount has raised which may not be taken into account with averages. Safety Styles may need to revisit their inventory strategy as their turn over period is quite high; this would be a benefit for them in the long term by having quicker access to cash for investment in other assets. They should also pay attention to their Accounts Receivable Turnover and aim to reduce this. Liquidity: Whilst Safety Styles Current ratio and Quick asset ratio is declined they are both still very healthy numbers. Safety Styles non-current assets have been increasing annually. They may want to pay attention to reducing their inventory levels and accounts receivable to give them more cash and the opportunity to invest into non-current assets or reduce their liabilities as they currently has a low level of cash compared to inventory and accounts receivable. This will make the company more â€Å"liquid† in the short term. Safety Styles also has a very healthy quick asset ratio compared to the industry standard of 2. It should be noted that Safety Styles currently do not have a high level of liabilities and seem to be maintaining their levels of dent in relation to their assets Capital Structure: Safety Styles currently have a very low gearing ratio and are using retained earnings for most of their financing. External sources of financing will be a benefit to Safety Styles to help them grow and invest in additional non-current assets.

Brazil World Cup

The relationship between the FIFFA president Sepp Blatter and Brazil president Dilma Rousseff has been rocky, especially when the realization hit that Brazil is facing some alarming delays when it comes to the hosting of the 2014 world cup. Jerome Valcke (the general secretary of FIFFA) however has not helped to improve the overall relationship between not only Brazil and Blatter, but had made conflict, mostly initialized threw messages, envelope. The FIFFA president had asked for talks with Rousseff concerning the collapse of the relationship of organization and the world cup of 2014 hosts.The troubled partnership hit an all-time low at the weekend following Valcke’s criticism towards the hosts. The majority of the conflict that Valcke had made clear rather rudely, was focusing on the delays and the trouble it has a possibility to cause. An exert of the message includes â€Å"to push yourself, kick your arse and just deliver this World Cup†. The Brazilian government re sponded by saying they no longer desired to work with him, causing a stronger tension that came to the point of almost breaking the alliance they non-formally had.On Tuesday March 6 2012 ( 48 hours after his comments ) Valcke issued an apology followed up by another apology from Blatter that made clear his disapproval of Valcke’s words but also made clear that indeed time is running out. Blatter's letter states: â€Å"Please allow me to express my deepest regret for the present situation. I am gravely concerned about the deterioration in the relationship between FIFFA and the Brazilian government, a relationship that has always been characterized by mutual respect. He also includes: â€Å"Brazil deserves to host the World Cup and the entire world is looking forward to it. However, the sands of time have been running since 2007. † Brazil chose to accept the apology and at the current time FIFFA and Brazil our working to meet the deadlines of the world cup in time, and in peace.Bibliography Sepp Blatter Requests Talks with Brazilian President. † The Independent. Independent Digital News and Media, n. d. Web. 04 Nov. 2012. <http://www. independent. co. uk/sport/football/news-and-comment/sepp-blatter-requests-talks-with-brazilian-president-7543288. html>.

Monday, July 29, 2019

AB Volvo within the last three years (2014, 2013, and 2012) Research Paper

AB Volvo within the last three years (2014, 2013, and 2012) - Research Paper Example †¢ In order to evaluate the potential of investing in a business, the first step is to evaluate the profitability of the business by determine how the business has performed based on its recent history. †¢ The analysis will involve digging into financial reports for AB Volvo within the last three years (2014, 2013, and 2012). The financial factors to consider in the analysis will determine the business’s current net worth, its sales and expense trends and identify the company’s strengths and weaknesses. o The company’s budgets and tax returns since 2012 o An analysis of the company’s balance sheet to determine a list of current assets, liabilities and net worth o An analysis of the current accounts receivables o Analyzing the cash flow projections o Analyzing the profit and loss statements †¢ The analysis will also consider an evaluation of ratios that are key to making investment decisions. The ratios will evaluate the performance activity, liquidity, financing, and activity within AB Volvo: †¢ Performance Activity o Book Value Per Common Share o Cash Return On Assets o Vertical Analysis o Dividend Payout Ratio o Earnings Per Share o Gross Profit Margin

Sunday, July 28, 2019

Hypertension Essay Example | Topics and Well Written Essays - 1500 words

Hypertension - Essay Example This is not a condition which can be treated lightly. If you have Hypertension, you have to get it treated. You ignore it only at your peril. Doctors think that many things combine to cause Hypertension2. Hypertension can be caused by other illnesses and it is often cured once the original medical problem is cured Essential hypertension indicates that no specific medical cause can be found to explain a patient's condition and the symptoms just show chronically high blood pressure. Secondary hypertension indicates that the high blood pressure is a result of another condition, such as kidney disease or tumors, Being overweight, drinking too much alcohol, and eating too much salt, stress ,genetics, older age, family history of high blood pressure , chronic kidney disease and adrenal and thyroid disorders are risk factors because they raise your risk of having hypertension. They do not cause it directly but they can contribute to it and if not watched can aggravate it.. It is interesting to know, that while you cannot accuse a disease of being racist or sexist, if you are an African American you are more likely to get Hyperte nsion. If you are a pregnant woman you are again more susceptible to it. These are things which can't be ignored and many times these risk factors can add up and can be even more dangerous. A pregnant African American woman may need to look at the possibility of hypertension with that much more care. Now it does not mean that if you have any of these you are likely to get hypertension and that if you have none of these, that you won't get hypertension. It just means that if you have any of the above risk factors, you should make an effort to take precautions. Statistics on Hypertension The number of people suffering from Hypertension in the United States is staggering. In reports given by the department of Health, the percent of non-institutionalized adults ages 20 and over is 29% (2001-2004)3. That is more than one out of every four adults has Hypertension. This is a staggering number. And this is not some benign number either. This is a number which directly translates into fatalities. The number of deaths in 2004 was 23,076. In other words deaths per 100,000 populations are 7.9. These are real and frightening numbers. Symptoms of Hypertension Now, how would one know if they have hypertension There are usually no symptoms or signs of hypertension. In fact, nearly one-third of those who have it don't know it. The only way to know if you have hypertension definitely is to have your blood pressure checked regularly. If your blood pressure is extremely high, there may be certain symptoms to look out for, including, Severe headache , Fatigue or confusion , Vision problems , Chest pain , difficulty breathing , Irregular heartbeat Blood in the urine . People often think that High Blood Pressure is dangerous and while very often it is true, we deal with high blood pressure constantly on a daily basis. Blood pressure goes up in all people during periods of stress or exercise. But avoiding stress will not prevent high blood pressure. You can have High Blood Pressure even though you are usually a calm, relaxed person. High Blood pressure is fairly common and that is precisely why, everyone

Saturday, July 27, 2019

SWOT Analysis Psion PLC Case Study Example | Topics and Well Written Essays - 2250 words

SWOT Analysis Psion PLC - Case Study Example Psion is estimated to be the third largest supplier in its chosen markets on a global basis. In certain territories such as France and specific market sectors, for example, ports, the Group has the leading position. The principal activities of the Group are providing mobile enterprise computing solutions, integration services and product support and maintenance to customers worldwide. The company has leading expertise in engineering, integration and ergonomics and design and delivers these high quality and rugged mobile computers to best-in-class standards. The Group provides enterprise solutions for the mobile work forces of larger corporations. Solutions require the implementation of complete systems including robust mobile computers, wireless networks, and automatic data recognition equipment and integration software. Psion produces mobile computing solutions, which delivers real-time access to enterprise data at the point of activity to improve business efficiency and productivit y for leading enterprise around the world. Company has leading expertise in rugged hardware, integration, service and support. Strength: Psion has particular strengths in two major sectors: managing logistics in factories, warehouses and ports with local area networks; managing information for dispersed field forces over wide area networks. Core value to it's customers resides in the ruggedness and reliability of Psion products in often demanding environments, in the specialized knowledge of customer requirements and in the ability to supply, service and support its customers globally, is the main stay of the company in the global market. Company's strength includes Innovation in technology and in its products will continue for many years as a driver of productivity growth for customers. Company has leading expertise in rugged hardware, integration, service and support. Company's aim to leverage its reputation and brand to develop strong business relationships based on the quality of its offering, and proven ability to address customers' operational and logistics challenges, while delivering a strong return on investment for their businesses. The Group is in a good strategic position and has a strong management team that is well placed to target long-term growth with satisfactory returns to shareholders. The Group's range of hand held and vehicle mounted computers and wireless access points are designed for particular markets and applications are the main products and its main strengths. The principal design criteria include functionality; ruggedness and cost effectiveness has been the strengths of Psion. . Products are updated or replaced periodically, typically every 3-4 years. However, a customer may continue to use a device for many years and the Group provides maintenance programmes to continue the life of the product in use for as long as practicable. High volume terminals are designed to be highly configurable through the use of modular components or customizable where the terminal may have parts specifically incorporated solely for a particular customer. Company's ability to p rovide customers with a complete and distinct solution through hardware customization and the inclusion of third party products is one of the factors, which distinguishes it from its competitors and remains its strengths. Most field-based

Friday, July 26, 2019

CONTEMPORARY ISSUES IN EDUCATION and TRAINING Essay

CONTEMPORARY ISSUES IN EDUCATION and TRAINING - Essay Example On the other hand, people from the supposed low class may not be able to get all the constructive things. Although, they may be interested to access all the constructive things particularly education, because of their economic and social drawbacks, they may not be able to do that. In those cases, the role of government and other governing bodies assumes so much importance. From earlier times, government has been coming up with various policies and steps, to give them a platform or backup to aid them in their endeavours. This is particularly visible in the educational sector. Education plays an important part in the intellectual and mental development of any individual. Education is an imperative part of human life as it directs person particularly young children towards his/her progress. Thus, lack of education could take the lives of people in the negative direction. Although, this is not a norm, as many people without education are shining in various fields, however, the fact is, e ducation provides them the platform to learn a lot of things, and importantly gives them the confidence to go for various optimum targets. To fulfil this motive only, government has been giving free or subsidized education to the needy target group. Although, this government policy and social initiative is aiding a lot of children and providing positive results, some scepticism has arisen due to the new studies, which show that social background determines pupils' success. That is, even if the economically and thereby socially disadvantaged people are given free education in the form of Free Schools and City Academies, it does not guarantee their success. This implies that the children’s social status is the reason for their lack of success, and the government should reconsider or even stop its free or subsidized education, as it does not lead to success. However, the fact is, various other factors plays a role in the academic success of the children, and their social status is not a major reason. So, this paper will discuss the above assumptions regarding the class differences, and will point out how there are many more factors that play a role in a child’s academic success, than the class differences. â€Å"Class in Classrooms† For a child to become educationally equipped various factors come into play and all these factors have to be fulfilled. Among these, the two key factors are the parents and the school, its teachers. As the child will spent maximum of their childhood years and time in their household and in their schools, these two factors or environments will only play a key role in their development and in their future. Among these two environments, it is always said and assumed that the school environment only play the major role as far as academic success is concerned. With the children spending more productive time in their schools only, than their homes, in their crucial formative years, it is logical to say that the schools and their teachers mainly play the influencing role in the academic success of the children. Although, the role of parents and home environment cannot be totally ignored, the schools are said to decide the pupil’s success. However, recent studies have stated that the children’s parents and their home environment, thereby their social background maximally influences the academic succ

Thursday, July 25, 2019

Global warming Essay Example | Topics and Well Written Essays - 500 words - 2

Global warming - Essay Example With the influx of urbanization, pollution from engines, industries, and companies needs to be stringently regulated. Such has become an advocacy for Intergovern ­mental Panel on Climate Change (IPCC), World Meteorological Organisation (WMO), and the United Na ­tions Environment Programme (UNEP) since 1988 with civil society around the globe (IPCC, 2007). The issue deserved serious concern as global temperature increased from 3 ° to 5 ° C – and might reached at 5.4 ° to 9 ° Fahrenheit in 2100. The sea level has also risen at 25 meters and is projected to reach 82† by the year 2100 (IPCC, 2007).    The rise of global temperatures brought along some drastic changes in land and oceans as thermal expands at the ocean and the rapid melting of polar and Antarctic regions (IPCC, 2007; Craven, 2012). Ecologists likewise observed that precipitation patterns are changing with disaster’s increase of numbers and intensities. Experts posit that the erratic increase of frequency, duration, and intensity of climatic outburst caused so much flooding, prolonged drought season, severe heat waves, and changes in weather patterns (IPCC, 2007; Craven, 2012). The global warming cause negative impact to agriculture too as yields became poor; more glacial retreat, reduced summer period; and brought extinction of some species (IPCC, 2007; Craven, 2012). Health experts also argued that global warming also espoused malaria and other diseases in areas where these have been quelled before (IPCC, 2007). Global warming is a consequence of both manmade actions and astronomical developments influencing the earth’s surface (Craven, 2012). In the last decades, people have increasingly devastated ecology with pollution, logging, mining, and other resource related extraction. This is further aggravated with the recent phenomenon when the sun reached its ripening period thus producing some C-flares,

Wednesday, July 24, 2019

Managing Organisational design and change Essay

Managing Organisational design and change - Essay Example The primary objective of an organisation is to fulfil the common objective of concerned people. It is very crucial entity for society that collected individual efforts and execute these effort for meeting its primary aim. For example, business organisations have different functions like financial functions, marketing functions, human resource functions and operational functions etc (Hoffmann et al, 2008, p.39). Organisations are composed of various human resources who work together for a common objective. The management is the most crucial factor, since it is responsible for ensuring the well being of human resources and in turn accelerating the growth of the organisation. The composition of organisation varies according to its type and nature. The management teams are responsible for developing an organisation. These management teams are divided as per the requirement and each team looks after a particular area. For example, account and finance department takes care of financial activity and human resource department manages the employee related activities. In this process, proper leadership and relevant management style determines the efficiency level of the organisation. The primary for organising an organisation, three factors are important. These are the constitution, management committee and staffs & volunteers (Object, n.d.). The purpose of creating organisation varies in accordance with the objective of its people. Therefore, organisation structure and type differs. They can be categorized as profit making or non-profit making; governmental and non-governmental organisations. For example, the profit making organisations are the business organisations and its primary objective is to increase its shareholders’ wealth. Whereas, the non-profit making organisations work for a social cause. One of the primary reasons for these differences, stated above, is the objective

Suicides linked to bullied victims Research Paper

Suicides linked to bullied victims - Research Paper Example Many innocent lives have been lost owing to this problem of bullying and these precious lives could have been saved if proper intervention and help was provided for these issues. Bullying can be defined as acts of aggression which tend to humiliate the victim through every possible mean. According to Olweus, ‘A student is being bullied or victimized when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other students’ (Olweus 2001 p 5-6). Thus, bullying is basically a means of degrading a person to an extent that he may lose his confidence and morale and tend to consider options like suicide as the only solution. Different incidents have marked the severity of this act of bullying. Innocent young teenagers have died due to being the victims of humiliation. The examples of Tylor Cementi who was an 18 year old boy and Phoebe Prince who was a 15 year old girl serve as eye openers to highlight the issue of bullying. Tylor Cementi was a bright and intelligent boy who enrolled new in his university. Cementi was a homosexual and his sexual orientation was used as a point to bully him. His colleagues plotted against him and made a video of his private encounter with his homosexual partner. They then posted it on the internet which served to publicize a private encounter of Clementi. The young boy could not face this humiliation and he found it easier to submit him to death rather than face this embarrassment. He jumped off a bridge and committed suicide. The suicide of Tylor Clementi was a tragic incident and it was an example of cyberspace bullying. It left a great impact (Schwartz 2011). Phoebe Prince enrolled new in her school, South Hadley High School  after she moved from Ireland to the United States with her family. She became the target of the bullies and had to undergo severe pressure and mental exertion. She was bullied for three months in her school by different means which include calling her with names as well as physical harassment by the bullies. They used to give her disgracing names to humiliate her. The social networking sites served as another way to further bully Phoebe and to further publicly humiliate her. She finally could not face the pressure and gave up her race of life and committed suicide. Her death came as a shock and it served a great effect owing to the fact her suicide had just shortly followed the suicide of another young boy of 11 years in a school located in close vicinity to South Hadley High School. Serious notice of the incident was taken by the governing body in the state of Massachusetts which started formulating plans for the passage of laws to check into matters of bullying. The school also started to consider the issue seriously and started working towards creation of bodies to tackle the issue of bullying (Eckholm and Zezima 2010). Strong correlations and links between suicide and bullying have been reported. There has been an alarming rise in the suicide rate throughout the world. It is analyzed that amongst youth suicide ranks as the third reason of death. The CDC reports that 4400 deaths can attributed to suicide annually. Students who are enrolled in high school show very high levels of suicide and it has been analyzed that 7 percent of these students have actually tried to commit suicide. A research conducted by the Yale

Tuesday, July 23, 2019

Liberia Essay Example | Topics and Well Written Essays - 500 words

Liberia - Essay Example In fact, even African slaves from other parts of Africa were also sent here instead of their place of origin. Until today, Liberia is assisted by the U.S. as evidenced by the fact that â€Å" The U.S. Agency for International Development (USAID) implements the U.S. Governments development assistance program in Liberia, the second-largest USAID development program in Africa† (Liberia, state.gov). The economy of Liberia. The GDP of Liberia according to 2008 estimate totals to $1.471 billion or $379.9 per capita ( IMF , 2009). On the other hand, U.S. has a GDP of â€Å" $14,461.7 billion in the last quarter of 2009† ( bea.gov.) posting a 6.3% increase in GDP. On the contrary, Liberia’s GDP growth rate is as of 2009 was projected at 1.2% ( U.S. Dept. of State, 2010). Liberia’s economy is basically agricultural although it has sizeable resources of iron ore and rubber. In fact, rubber is one of its biggest exports which is followed by timber ( Bateman, et.al, 2000). Liberia has good prospects in advancement when it comes to technology. In 2007, Liberia’s president, Ellen Johnson-Sirleaf unveiled the new National and Communication Technologies Policy for Liberia in a conference in its capital, Monrovia. The said convention was sponsored by big names in ICT industry such as Microsoft , Cisco, and Georgia Institute of Technology that sponsored the two national facilities: a community-based PC laboratory and a multi-media laboratory ( Webwire,2007). Analyzing from this events , Liberia is heavily dependent on foreign investment and aid from the U.S. While Liberia is continuously developing ICT, U.S. is on the wake of finding solutions to curb its greenhouse gas emissions. Its technological development is now geared towards finding more â€Å"environment-friendly† sources of energy similar to the thrust of the United Kingdom. In fact, one the U.S. hottest pursuits now is searching for bio-fuels for a cleaner future as reported ( Peller in,2010

Monday, July 22, 2019

Differences Between Pr and Advertising Essay Example for Free

Differences Between Pr and Advertising Essay Differences Between Advertising and Public Relations Advertising vs. public relations, these two industries are very different even though theyre commonly confused as being one and the same. The following ten properties just scratch the surface of the many differences between advertising and public relations. 1. Paid Vs Free Coverage * Advertising: The company pays for ad space. You know exactly when that ad will air or be published. For Example: Infosys gives an ad in The Hindu on Wednesdays in the Opportunities column. So it has the liberty and control to opt whether they want to give the ad on a particular Wednesday or not depending on their requirement. * Public Relations: Your job is to get free publicity for the company. From news conferences to press releases, youre focused on getting free media exposure for the company and its products/services. For Example: Tata Nano is the best example of this. Till now Nano was not advertised and all its publicity is through PR. 2. Creative Control Vs. No Control * Advertising: Since youre paying for the space, you have creative control on what goes into that ad. Any feature of the ad can be designed according to the way you want to portray the image of your company. For Example: Close-up portrays a youthful image through its advertisements, whereas Cadbury (which earlier had largely targeted the youth) has shifted its focus and now projects its chocolate as something for the whole family to enjoy during times of rejoicing. * Public Relations: You have no control over how the media presents (or misrepresents) information about your organization. For Example: Reliance did not have a control over the news which was published regarding the conflict between Mukesh Ambani and Anil Ambani and had to pay for it in form of loss in the share price (initially). 3. Shelf Life * Advertising: Since you pay for the space, you can run your ads over and over for as long as your budget allows. An ad generally has a longer shelf life than one press release. * Public Relations: You generally submit a press release about a new product once. You only submit a press release about a news conference once. The PR exposure you receive is only circulated once. An editor wont publish your same press release three or four times in their magazine. 4. Wise Consumers * Advertising: Consumers know when theyre reading an advertisement theyre trying to be sold a product or service. The consumer understands that we have paid to present our selling message to him or her, and unfortunately, the consumer often views the selling message very guardedly. * Public Relations: When someone reads a third-party article written about your product or views coverage of your event on TV, theyre seeing something you didnt pay for and view it differently than they do paid advertising. Where we can generate some sort of third-party endorsement by independent media sources, we can create great credibility for our clients products or services. 5. Creativity * Advertising: In advertising, you get to exercise your creativity in creating new ad campaigns and materials. Some jingles in the ad have a long bonding with the product. Few Examples: Surf comes with a series of new ads from time to time. Britannia’s jingle is well remembered and is branded even in its website. * Public Relations: In public relations, you have to have a nose for news and be able to generate buzz through that news. You exercise your creativity, to an extent, in the way you search for new news to release to the media. For Example: Apple iPhone is an example of this. Apple created a huge buzz in the market exercising creativity to and extend and the result was a huge demand for the Iphone much before its release date. 6. Target Audience or Hooked Editor * Advertising: Youre looking for your target audience and advertising accordingly. You wouldnt advertise a womens TV network in a male-oriented sports magazine. * Public Relations: You must have an angle and hook editors to get them to use info for an article, to run a press release or to cover your event. . 7. Special Events * Advertising: If your company sponsors an event, you wouldnt want to take out an ad giving yourself a pat on the back for being such a great company. This is where your PR department steps in. Public Relations: If youre sponsoring an event, you can send out a press release and the media might pick it up. They may publish the information or cover the event. 8. Writing Style * Advertising: Buy this product! Act now! Call today! These are all things you can say in an advertisement. You want to use those buzz words to motivate people to buy your product. * Public Relations: Youre strictly writing in a no-nonsense news format. Any bl atant commercial messages in your communications are disregarded by the media.

Sunday, July 21, 2019

Advantages And Disadvantages Of Mergers And Acquisitions

Advantages And Disadvantages Of Mergers And Acquisitions Submitted By: Yatendra Kumar Discuss the strategic rationales and motives for American companies wishing to execute mergers outside the American borders. Do you think it is correct for the European Union to restrict mergers between American companies that do business in Europe? (For example, the European Commission vetoed the proposed merger between WorldCom and Sprint, both U.S. companies and it carefully reviewed the merger between AOL and TimeWarner, again both U.S. companies). Make recommendations on whether such mergers in the European Union are a worthwhile investment for American corporations. Introduction Todays business world is of growing economy and globalization, so most of the companies are struggling to achieve the optimal market share possible on both market level i.e. Domestic and International market. Day by day business person works to achieve a most well-known goal i.e. being the best by what you perform as well as getting there as quickly as possible. So firms work effortlessly to beat their rivals they assume various ways to try and do thus. Some of their ways might embody competitive within the market of their core competency. Therefore, it insuring that they need the best knowledge and skills to possess a fighting likelihood against their rivals in that business. In 21st century businesses are the game of growth. Every business want the optimum market share (growth) over their competitors, so companies are trying to get optimum growth by using the most common shortcut i.e. Merger and Acquisition (MA). The growth main motive is financial stability of a business and also the shareholders wealth maximization and main coalitions personal motivations. Mergers and acquisitions (MA) provides a business with a potentially bigger market share and it opens the business up to a more diversified market. In these days it is the most commonly use methods for the growth of companies. Merger and Acquisition (MA) basically makes a business bigger, increase its production and gives it more financial strength to become stronger against their competitor on the same market. Mergers and acquisitions have obtained quality throughout the world within the current economic conditions attributable to globalization, advancements of new technology and augmented competiti ve business world (Leepsa and Mishra, 2012). In the last decade, MA are the dominant means of organizations globalization (Weber, Shenkar and Raveh 1996). Merger particularly could be a growing development that has become an area of the recent business conditions and its apparent to possess affected each nation and trade (Balmer and Dinnie 1999). Concept of Mergers and Acquisition The main idea behind mergers and acquisition is one plus one makes three. The two companies together are more worth full than two classified companies at least thats the concluding behind mergers. Merger is the combination of two or more firms, generally by offering the shareholders of one firms securities in the acquiring firm in exchange for the acquiescence of their shares. Merger is the union of two or more firms in making of a new body or creation of a holding company (European Central Bank, 2000, Gaughan, 2002, Jagersma, 2005). In other words when two firms combine to create a new firm with shared resources and corporate objectives, it is known as merger (Ghobodian, liu and Viney 1999). It involves the mutual resolution of two firms to merge and become one entity and it may be seen as a choice created by two equals. The mutual business through structural and operational benefits secured by the merger will reduce cost and increase the profits, boosting stockholder values for each group of shareholders. In other words, it involves two or more comparatively equal firms, which merge to become one official entity with the goal of making thats value over the sum of its components. During the merger of two firms, the stockholders sometimes have their shares within the previous company changed for an equal amount of shares within the integrated entity. The fundamental principle behind getting an organization is to form shareholders wealth over and higher than that of two firms wealth. The best example of merger is merger between AOL and Time Warner in the year 2000. In 2000 the merger between AOL and Time Warner is one of the biggest deal that later fails. Advantages and disadvantages of Mergers and Acquisition (MA) The advantage and disadvantages of merger and acquisition are depending of the new companies short term and long term strategies and efforts. That is because of the factors likes market environment, Variations in business culture, acquirement costs and changes to financial power surrounding the business captured. So following are the some advantages and disadvantages of merger and acquisition (MA) are: Advantages: Following are the some advantages The most common reason for firms to enter into merger and acquisition is to merge their power and control over the markets. Another advantage is Synergy that is the magic power that allow for increased value efficiencies of the new entity and it takes the shape of returns enrichment and cost savings. Economies of scale is formed by sharing the resources and services (Richard et al, 2007). Union of 2 firms leads in overall cost reduction giving a competitive advantage, that is feasible as a result of raised buying power and longer production runs. Decrease of risk using innovative techniques of managing financial risk. To become competitive, firms have to be compelled to be peak of technological developments and their dealing applications. By MA of a small business with unique technologies, a large company will retain or grow a competitive edge. The biggest advantage is tax benefits. Financial advantages might instigate mergers and corporations will fully build use of tax- shields, increase monetary leverage and utilize alternative tax benefits (Hayn, 1989). Disadvantages: Following are the some difficulties encountered with a merger- Loss of experienced workers aside from workers in leadership positions. This kind of loss inevitably involves loss of business understand and on the other hand that will be worrying to exchange or will exclusively get replaced at nice value. As a result of MA, employees of the small merging firm may require exhaustive re-skilling. Company will face major difficulties thanks to frictions and internal competition that may occur among the staff of the united companies. There is conjointly risk of getting surplus employees in some departments. Merging two firms that are doing similar activities may mean duplication and over capability within the company that may need retrenchments. Increase in costs might result if the right management of modification and also the implementation of the merger and acquisition dealing are delayed. The uncertainty with respect to the approval of the merger by proper assurances. In many events, the return of the share of the company that caused buyouts of other company was less than the return of the sector as a whole. The merger and acquisition (MA) reduces flexibility. If a rival makes revolution and may currently market vital resources those are of superior quality, shift is tough. The change expense is the major distinction between the particular merger worth and also the merchandising value of the firm that can be of larger distinction. Literature Review: This paper deals with the merger and Acquisition of the companies. The combination of two firms is measure additional value than two companies at least thats the concluding behind mergers. This also includes the main strategic rationales and motives for American companies wishing to execute mergers outside the American borders and also is the European Union restriction on the American companies MA with European companies is correct by the help of case study of merger between AOL Time Warner. Strategic rationales and motives for American companies: The main rationales and motives of American companies to merger outside the America are to extend their market, get new source of raw materials and tap in large capital market. The cross-border MA is a widely used and popular strategic means for international companies looking to expand their business reach, widen new production facilities, enlarge new sources of raw resources, and tap into capital markets (Weston, Chung, Hoag, 1990). Deals out of the borders have been many and large during the 1990s (Subramanian et al., 1992), and the deals like that are probable to attain new heights due to globalization trends, decline in unwieldy business regulations and red tape, and by the development of standardized accounting standards by various capital-starved countries (Zuckerman, 1993). Moreover, the main motive is to expend their business or market and develop new sources for raw material. Restriction for Mergers in European Union: In the earlier times, the enforcement rules in European Zone against mergers were totally different. In the starting, the European Community wasnt abundant involved concerning mergers. The founders of European Economic Community believed that division of markets resulted into unskillfully and for them largeness was never a problem or a haul (Bermann et al, 1993). Theyd even thought of regulation as an answer for giant mergers instead of de-concentration. Actually, Mergers were generally accepted and cross-border mergers were most welcome which might facilitate mix the European Union. To the extent that the European Community started taking social control for mergers seriously, it majorly focused upon a drag that mergers would produce abuse of market power (Eleanor, M n.d). Finally, European Commission (EC) law thought of merger as a main growing concern. The EC authorities make certain that, once companies merge, the market balance is maintained and avoid distortion of competition an d formation of dominant position that might be abused. Giant companies ought to take approval from the European Union and deliver them with necessary one. Case study The merger between AOL and Time Warner was declared on 10 January 2000 and it was worth $183 billion. That was the biggest merger in the history of American business world. AOL had about 40% share of online service in the United States and the Time Warner have more than 18% of US media and cable households. The merger is taken into account to be a vertical merger between one amongst the most important web service suppliers and this one amongst the biggest media and entertainment firm. The new company was formed and named as AOL Time Warner and was the fourth biggest company in the US, as evaluated by stock market valuation. After the merger deal, AOL become a subsidiary the Time Warner Company at stage and has operations in Europe, North American countries and Asia. As a web service supplier, AOL on look severely rival from Microsoft, Yahoo and different low price net access suppliers. Thus, the corporate tries to induce advertising and e-commerce growth, thereby separate it by rival (BBC, 2000). Impact of deal on the performance After the official announcement of deal merger between AOL and Time Warner growth rate in revenue has dramatically declined. The profitability suffered a good plunge when the alliance. The potency of the new united firm was terribly poor as determined from the asset turnover ratio. Even the liquidity of the firm suffered once the merger as evident from this ratio. There are several reasons for failure however the foremost vital reason was the unequal size of the companies, wherever AOL was overvalued as a result of web bubble. According to New York share exchange before the deal the share price of AOL is 73 and Time Warne is 90 but after announcement of the merger deal the shareholders dissatisfaction shown on share market of AOL and Time Warner and the shares drop down to 47 and 71 respectively. AOL and Time Warner fail to keep up shareholders satisfaction levels this conjointly one among the rationale to loosing stability of share holders according to the Times magazine (Kane and M argaret, 2003). The market valuation of both the companies AOL and Time Warner were decline from the starting of the merger to end of the deal. AOL has drop down approximately 60 percent and Time Warner around 30 percent of market value once the deal has been closed. The market valuation of both the companies from 2000 to 2011 was dropped down drastically. The AOL market value has dropped from 167$ billion to 107$ billion and the Time Warner 124$ billion to 99$ billion and is the biggest dropped down of any company in American history. Reasons for merger Failures 1+1 = 3 sounds great but in practice or reality every time its not work properly and go awry. Historical trends show that roughly 2 thirds of huge mergers can let down on their own terms, which implies theyre going to lose worth on the stock exchange. The motivations that mainly drive mergers are frequently blemished and efficiencies from economies of scale might prove elusive (Investopedia, 2010). Adoption of the new technology takes time for the normal company. In late twentieth century dramatic changes has occur in web. Migration of recent mode of web service is connected with high barricade and a number of other social and legal problems was encircled around and recently established firms like yahoo, msn etc was giving high edge competition. Economical rate of inflation is high, to create economy stronger American government has modified the policy and taxation rules have throwing a dispute for AOL to beat this things merger with Time Warner became a fruit to the AOL. Public and private policies are one of the reasons for the merger failure. The reasons of merger failure is over valuation of AOL shares has shown a dramatic impact on the deal, where as stake holders are not satisfied and improper communication with consumers damages the trust of user. The mergers fail was a result not only because of the replete of the dot-com bubble but it also the failings by AOL Time Warn er management to ever really integrate the two firms. Conclusion One size does not match all. Several firms think that the most effective way to get ahead is to expand business boundaries through mergers and acquisitions (MA). Mergers produce synergies and economies of scale, increasing operations and cutting prices. Investors will take comfort within the idea that a merger can deliver increased market power. The same thing happens with the Americas biggest merger deal between AOL and Time Warner. They think that merger is helpful for both the companies but it not matched for both of them. Both AOL and Time Warner synergies shows diversification is that the main goal of the firms to extend the revenue and to attain the value gain because of the amendment in mode of technology and increase in the competition for the well established firms. Throughout the phase of merger web bubbles also the main cause for over valuation of shares. In distinction Time Warner was the victim of net bubble. This type merger failure cases shows support the European Comm ission to restrict the American companies to merge with the European companies. European commission has a right to govern the European market and make stable the Euro Zone market. The European commission (EC) is thought of defending domestic companies from foreign rival and they encourage their zone mergers. So the European commission doesnt want any problems like dis-economies of scale, clashes of cultures and reduction of flexibilities by the merger of American companies. So the merger is highly regulated by European Union to avoid major concentration of economic power in euro zone. The merger deals cases like AOL and Time Warner helps the European Commission (EC) to make strict rules to restrict the merger and acquisition (MA) of American companies with the Euro Zone companies. Advantages and Disadvantages of Mergers and Acquisitions Advantages and Disadvantages of Mergers and Acquisitions Mergers and Acquisitions can be described as a step taken by any two organizations to make a more valuable company rather than two separate companies. Although the terms merger and acquisition are used very closely, but they are different. When one company takes over the other, the target company is taken as non-existent and the buyer company takes over the company continues to trade the stocks with its name. Whereas, in case of mergers, two separate firms, mostly of the same size, mutually agree to go forward with an entirely single new company with respect to the operations and owning of the new firm jointly rather than two separate firms. The case is about the merger of British Airways and Iberia making them to catch up on their rival Air Carriers and compete with the low-cost airlines, rising fuel costs, security concerns and costs for customers. However, due to commercial purposes, both the Airways would retain their existing brands. Both the companies look forward to gain from the merger with respect to a greater access across America. For the miracle worker, William M Walsh, who announced the planned merger, after a difficult year for British Airways, due to Icelandic Volcanic Ash Clouds and Cabin Crew strikes, situation has become even more trouble-some with the kind of response British Airways has been receiving from the BASSA (British Airline Stewards and Stewardesses Association), Unite Union, BALPA (British Airline Pilots Association) and their own staff. Though the travel analysts believe that the merger would on a long run prove to be beneficial for travelers or customers, but the concern right now for British Airways is to re-convince the BASSA (British Airline Stewards and Stewardesses Association), Unite Union Leadership who have changed their mind to settle for the new changes taking place. On the other hand, the media and the staff including BALPA (British Airline Pilots Association) are also at unrest due to the new proceedings taking place. Now the problem which Tom McCarthy, the retiring HRM Director of British Airways is trying to resolve is how the British Airways can settle the industrial unrest. As clearly stated, the industrial unrest is caused due to the merger with Iberia, and also the proposed plans of pay-cuts, redundancy, job losses and retaining the best talent pool and change in working conditions. Unite union, after the shareholders meeting, have announced to ballot the choices of cabin crew, whether to or not to take any further industrial action. However, on the other hand, BASSA (British Airline Stewards and Stewardesses Association) is also seeking a ballot for carrying out a strike against the British Airways. If I was asked to determine, how the British Airways could manage the rounds of Industrial Action, my first step would be to call for a meeting with the British Airways Carriers Management, the complete management representatives, representatives from the Unite Union, from BASSA (British Airline Stewards and Stewardesses Association), from BALPA (British Airline Pilots Association) and the staff. Since, this merger was planned, the expected output with respect to revenue is profitable, the concerns of the manpower cannot be ignored. Thus, a consultative meeting with the purpose of Collective Bargaining could be planned and called. Collective Bargaining can be used as a term for voluntary negotiation between the employer, employee or the trade union. The purpose of collective bargaining is to reach at a mutual agreement with respect to the work and the working conditions. Since, the purpose would be to negotiate, the management would point out the benefits of the mergers and the reasons for the decisions that could or would be taken due to the same. The discussion, on the other hand, give a chance to the other side of the employer, to put their view-point forward and also, come up with suggestions that could ease out the unrest amongst the staff and their associations. The steps that could facilitate a better response from the employees, other than a collective meeting for negotiation could be holding department wise meetings, encouragement of written communication, placing of suggestion box at various areas for the employees. As a second step, I would have to draft the expected Human Resource challenges that the British Airways would face due to the industrial unrest caused by the merger. During a merger, the human capital, i.e., the employees are scrutinized other than financial and material assets of any company. The staff, across levels become insure about their job. They fear demotion, decreased salaries and even continued employment. The main Human resource challenge faced is to decide how many employees would be affected and what would be the time line for the same. The issue of taking such decisions requires a good and clear communication that is free from any kind of rumors. In mergers, mostly one or few among the available are taken, either the company proposes downsizing, wherein, the decision is taken to let the personnel go for improving their efficiency or lay-offs, wherein, the termination takes place, either of employees or of positions. The decision for such affair is taken by the dominant company and thus, the HR needs to follow a professional approach towards planning a fair method of lay-off implementation. Another issue is to assimilate the new employee with the old after the merger. The introduction and assigning of team to facilitate team work would have to be done with great planning and care. Also, as discussed earlier, the concern which is faced by the British Airways is the resistance to change by the employees. With a proper channel of communication, suggestion boxes etc, this problem can also be worked out and sort a solution for. For any merger to be successful, it is imperative, that the manpower, the people involved, who drive the business and its growth are capable of creating, innovating and executing things collaboratively. The employees should be able to understand, why such an action is taken by the management and what benefit it would produce for them. They should be able to relate the value , the merger would bring to their daily work life. The challenge here is that the management should not act as an administrator but a coach or profit consultant. The Human Resource department here should focus on easing the merger transition and fitting the pieces as closely as possible. It should initiate in areas other than just administration or payroll but work closely together with the management in recruitment, retention and managing the effects of cultural change. The people may also be resistant to change because they might have to work in a different process, different department, different geographical location other than a different team, management and new members. The HR should take up these issues seriously as it might result in walk-outs also, as in the case of British Airways where BASPA is planning for a strike ballot, where around 10,500 workers may walkout. The possible solutions or potential HR strategic plans should be drafted. The management could give time to the employees to build trust amongst all the new people, the environment and the changes introduced. Both the companies should appoint an integration team, which would include the Human Resource team to meet periodically to plan the changes and execute the same at the acquired firm. The HR team of the dominant company would have to learn about the acquired company, its business and the people working in it. The approach to be followed should be of participative nature and not dominative. Like in British Airways, where it has been clearly agreed by Walsh, that the jobs would be lost, cost cutting would be exercised, and employees may be asked for voluntary redundancy other than pay-cuts for cabin-crew. On the other hand, Iberia also plans to freeze their hiring plans and also request for early retirement of many of its employees. Measure should be take to be taken to address the concerns of the employees, by mean of an open communication, there could be a hot-line for the employees where they may call and and confidential seek answers to their queries , since many employees may not want to put their foot forward in public. The purpose should be to encourage the employees to meet their new counterpart and companions. The Human Resource team should focus and aim at introducing and familiarizing the new teams and new set of people with each other, as these people are insecure and worried about their jobs and future. With British Airways and Iberias merger, the possible areas of conflict and resistance that may arise in the transitional period of replacing old crew with new crew. The transitional period bring with it a lot of anxiety, rejection, self-protectiveness, this was not hoped for response for the new management, defensiveness etc. The employees may not be ready to work with people they do not think they will be able to be friendly with. Since, the feeling and anger of losing their friends, who because of the merger, might have been laid off or downsized. The staff members may not want to work under the new policies and practices laid down by the new management. They may also be resistant to change their location or department of work. During transition, employees may feel displaced, low on energy, may resent to learn new things, may lose focus. People during such time , want their normal days to return as quickly as possible. They at such times have an amplified need for predictability, control and protection. An aggrieved employee would look for visible leader, accessible management Whenever an organization makes a change, its people have to deal with, first an ending or letting go of what was; then a time between the old and the new when the person is a drift called the neutral zone, and then a new beginning or reintegration. (Bridges, 1991). When we talk about a training program, we analyse the need for such a program on the first place. Since, here it is a matter of merger of two companies, where other than many changes, one change is about the working of the new company, its management, its policies and the planned practices. The training programme should be designed to serve the purpose of filling the gap between, what is know, may be through mouth of word, or as a rumor and to let people know the truth or the facts. The training program should be designed to address the issues of the employees concerned. Since, the company formed is new, it would have to address the concerns relating the working style and the management, the people in the management etc. It should focus on introducing the new formulations, rules, regulations, and peole in the company.

Saturday, July 20, 2019

Impact of IT on Bank Performance

Impact of IT on Bank Performance IMPACT OF INTERNET TECHNOLOGY ON BANKS PERFORMANCE AND CUSTOMERS SATISFACTION ABSTRACT Internet technology is very popular and has many benefits for the users; however it does has some elements of security risks to the bank and its customers at large. In this research work, I intend to look at impact of internet technology on Bank, its employees and the customers. More importantly, efforts were also made to research into various risks associated with this technology such as hacking, spam-email, phishing, identity theft or frauds and many others. After critical look at this technology and its associated risks especially the identity theft, two sets of solutions were recommended. The first set solutions addressed physical access control while the second aspect deal with authentication through the process of fingerprint and voice recognition. 1.0 INTRODUCTION This project is trying to evaluate the impact of Internet technology on banks performance and customers satisfaction. Banking industry is the bedrock of economy, the state of Banks will dictate the state of economy. If it stables, so will the economy. The present global economy recession attests to this statement. Technology innovation like Internet is groundbreaking in banking system. Transactions worth of billions of dollars take place in seconds in the electronic circuit throughout the globe (Castells, 2001). The banking and financial industry is transforming itself in unpredictable ways (Crane and Bodies 1996). Prior to the rocket of technology in banking sector, the function of the branch was very unlike the function of present branch. Earlier before the 1970s, the structure of the branch and functions were similar to one and other. Product offerings were equally the same and branches were only avenue for customers to make bank transactions. Majority of these banks were only rel ying on one or two branches but with many staff and cashiers. Customers were subjected to long distant travelling before they could carry out banking transactions. Face to face traditional banking was only means to process bank loan, make lodgements and withdrawals and customers were subjected to long queue in the banking hall. But the increase in the level of banking technology made the banks started a process of metamorphose that proceed till the end of the 20th century. As part of process, many channels of distributions were introduced. Among these channels are Automated Teller Machine (ATM), Internet banking, Telephone banking, call-centre, electronic funds transfer, wireless banking, and voice messaging systems, videoconferencing and many others. Rapid growth and development in internet technology over the last four decades have great impact on organisations. The impact was highly noticeable in area of services, products offering and business processes. Banks have use internet technology to cut operations costs, increase qualities, efficiencies and improve value-added services to the customers. Also, investment in technology gives competitive advantages to some Banks leading to some banks have opportunities to perform better than their rivals. Banks through the innovation of internet technology were able to provide better and cheaper services than traditional system of branch banking. Apart from these, level of banking transactions were equally increased, Convenience and twenty four hours banking services were also witnessed in banking system. More importantly, the level of communication within and outside the banking environment were equally improved, access to the right information and high quality of services were not comp romised. The banking environment became more friendly and flexible. Information that can only available through the means of technology became an important aspect of the banking. Many people argued that it was advance in technology of 1990s that made it possible to develop those channel of distributions and system that allowed the banks to render an unprecedented high quality services. In final analysis, this research work assess an aspect of banking that is lacking in Traditional Bank an online banking and its impact on customer satisfaction and banks performance. 1.1 AIM AND OBJECTIVES The research on Internet technology in banking and acceptance of modern banking by customers have been viewed in different perspectives but few aspects of this topic are left with little exploratory. There is little research on the effects of Internet technology on banks profitability and customers satisfaction. Many researchers did not fully agree that Internet technology has immensely affected the profitability level of the banks. The rationale behind this is to offer a better understanding on how internet banking is evolving. This study intends to achieve the following objectives: 1. Research the problem of identity theft and card authorisation 2. Evaluate the problem concerning lost revenue 3. Research the other work done in this area. 4. Proffer solution to the problem of identity theft and card authorisation. 5. Implementing solutions and the cost benefits 1.2 CONTEXT OF THE STUDY Banks have use internet technology to cut operations costs, increase qualities, efficiencies and improve value-added services to the customers. Also, investment in technology gives competitive advantages to some Banks leading to some banks having opportunities to perform better than their rivals. This research work is focusing on two important key elements which are: 1) Impact of internet technology on Bank and its customers and; 2) Associated risks with internet technology with more emphasis on identity theft 1.3 EXPECTED CONTRIBUTION TO KNOWLEDGE The expected contributions to knowledge of this research work are to identify various theft and card authorisation, evaluate the problem concerning lost revenue and proffer solution to the problems. 2.0 LITERATURE REVIEW It is my intention to survey literature review to reveal the level of knowledge and understanding of people about identity theft. A number of text books, articles and journals internet search are used for this purpose. Among these are: a) 50 ways to protect your identity and your credit card Steve weisman The book is well written very relevant to the study and well referenced. Various types of identity thefts were discussed. It also explains that the motive behind identity theft could be for financial gain, revenge or malicious intent. The book goes further to suggest some protection rules such as only the credit cards that needed should be carried in the wallet, the practice of online account statement should be stick to, personal information should not be given on phone to unknown persons, shredding documents that containing personal detail after use and so on. But these protection rules only addressed offline identity theft, the issue of online identity theft or frauds which common to credit cards were not addressed at all. b) Business Information system (Technology, Development Management) Paul, et al The book looks at the issues of identity theft, brand abuse and costs of identity theft. The three issues discussed are equally paramount important to this research. The book is good for academic and well referenced. According to the book, â€Å"the term brand abuse is used to cover a wide range of activities, ranging from sale of counterfeit goods, for example software applications, to exploiting a well known brand name for commercial gain. It was further stated that with regards to identity theft, CIFAS(www.cifas.org), a UK-base fraud prevention service, report that there were 80,000 cases of identity theft in the UK in 2006.The coated in the companys web site showed that identity fraud cost UK economy  £1.5b in 2005 and generates a revenue of  £10m each day for fraudsters. c) Identity theft literature review- Graeme, R.N Megan M.M It is a well written article and equally well referenced. In this article, the authors focused on two important issues, the first one is the cost of identity theft while the second one focuses on the issue of legislations. The two issues discussed are very relevant to this research. The authors look at various identity legislations passed to control the crimes of identity. (www.house.gov/apps/list/press/ca29schiff/062304idThef2.html). d) Enquiry in to the credit card fraud in E- payment- Jithendra, D. Laxman, G In this article the authors look at credit card Hacking and types of credit card frauds. This article is not well referenced and authors failed to proffer adequate solutions at end of the discussion. In my opinion, the article is much related to this research work but the sources of documents used to write the article cannot be easily traced because it is not properly referenced. However, it is very helpful reading in understanding the background of the topic. e) Identity theft and credit card fraud Sarah P. Miller Sarah Millers article examines the various tactics the fraudsters use to commit credit card fraud. Some of these tactics are; opening a new credit accounts, existed accounts hijacking, skimming tactic among the other. The article also looks at various ways of protections against credit card fraud and come up with some of security measures to guard against credit card fraud in our society. The article is appropriately written and very useful for this research. The source of the article is also quoted as http://EzinArticles.com/?expert=sarahp.miller . f) Improving response time of authorization process of credit card system- Humid, siti Hafizan Ab It is a journal of computer science published in February 1 2008. The journal discusses the issue of credit card authorization process. It also explains the pitfalls and benefits of credit card authorization. The journal is very briefs about the topic but all the salient points are well discussed. It gives a website as the only source but fail to give other reference. It is very pertinent to mention that the journal would have been a great assistant to the realisation of the objectives of this research work if it has been properly referenced but the beauty of this journal is that it serves as basis of understanding of the topic. g) 7 precautions that minimize the Risk of identity theft Jesse Whitehead In this article, Jesse looks at financial costs of identity theft and estimated it to be $50 billion. He further explains that researchers are yet to discover a precaution that is hundred percent guaranties against the risk of identity theft. In final analysis, Jesse recommends the following precautions to reduce the threat of identity theft in our society. One, he recommends that social security number should not be disclosed to anybody unless otherwise require by law. Secondly, it was also suggested that social security number should not be carried all about. Shredding all important documents immediate after use is strongly recommended and more emphasis should be placed on e- statements from our banks and credit issuers. It was also suggested that a strong password and pin should be created and printing of Driver licence number on our checks should be highly discouraged. The author gives this website as the source of article http://EzinArticle.com/?expert=jessewhitehead but no other reference available. It is very relevant to this project as important aspect of the topic is being discussed. 2.1 DEFINITION OF INTERNET According to Paul et al, â€Å"internet refers to the physical network that links computers across the globe†. From this definition, the interconnectivity of many computer devices all over the globe is done through the world-wide computer network known as internet. These computer devices store and transmit information like World Wide Web and electronic mail (e-mail) messages. There are other devices like mobile computer, pagers, web TVs that are connected to the internet. All these devices are revered to as host or end system. Both electronic mail and world -wide web are network application programs that run on host or end system. Like other internet units, end system run protocols that regulate the sending and receiving of information in the internet domain. Internet has two major protocols popularly called TCP (Transmission control protocol) and IP (internet protocol). Communication links like coaxial cable, copper wire, fibber optics or radio spectrum link end systems together. Data transmission rate of all these links are not the same. This transmission rate is known as bandwidth and is measure in bit or second. End systems are indirectly join to one and other vial routers and a router receives information from the incoming communication links and send it to its outgoing communication links. The IP defines the format of receiving and sending information between the routers and end systems. The path on which information is transmitted is called route or path. The internet then utilises packet switching which gives room for multiple communicating end systems to share a path of a path simultaneously. Connection of network to the internet needs to follow specific name and address and it must be run on the IP protocol. The arrangement of interconnection of the internet is from bottom to top. End systems is connected to local internet service providers by means of access network and this access network is refers to as local area network (LAW) or phone based access network. The local internet service providers are then connected to regional internet service providers. The regional internet providers will also connected to national and international internet service providers. This type of internet is called public internet. There are other private networks that cannot be accessed by public. It can only be accessed within the organisations and refer to as intranet. It also makes use of the same internet technology that public internet is using. Another way of defining Internet is to look at its infrastructural that offers services to distributed application. Internet provides opportunity to distribute application on its end systems to share data with each other. The application could be inform of e-mail, file transfer, remote login, and world-wide web and so on. Web can be ran over network apart from the internet but this does not suggest that web is a separate network, instead it is one of the distribute applications that make use of services offer by the internet. Both connection-oriented services and connectionless services are two services offer by internet to the distributed application. 2.2 GROWTH OF INTERNET Internet and computer networks began early 1960s. During this period, telephone was commonly employed as means of communication. This telephone network utilises circuit switching to transmit information from a sender to receiver and since then, internet continue to grow from strength to strength. There are a number of factors that contributing to this development. Financial analysts observe that costs, competition, demographic issues and customer service are the major considerations that make bankers to constantly review their internet bank strategies. It is the belief of these analysts that demand for internet banking products and services will continue to increase. But the major task facing banks now is how to ensure that the benefits of internet banking outweigh its costs and the risks. The strategies adopted by each bank to increase its market share and cost reduction vary from one bank to another. Internet is a platform through which customers access accounts and general informa tion. It gives customers information about various products and services offer by the bank. 2.3 RISKS OF INTERNET SERVICE There are a number of internet threats around business world today. The threat continue to increase as internet become more acceptable means of conducting online business transactions. As banks so heavily rely on internet to reduce costs, so also they become more prone to some risks. Few examples of these risks are as followings: a) Hacking Hacking involves attempting to gain unauthorised access to a computer system, usually across a network. Hackers only need limited programming knowledge to wreak large amount of havoc. The fact that billions of bits of information can be transmitted in bulk over the public telephone network has made it difficult to trace hackers, who can make repeated attempts to invade bank system. For instant, much damage could be done if people gain authorised access to banks network service. Hacker may gain access to banks internal network for two major reasons. It could be for monetary benefit which usually associated with identity theft where personal information as well as credit card details is obtained to perpetrate fraud. It could also come inform of malicious intent ranging from deletion of file, deliberate introduction of computer viruses into a system or forwarding vital organisations information to rival. Counter measure like dial-back security can be used to prevent this problem. It ope rates by requiring the customer wanting access to the network to dial into it identity themselves first. The system then dials the customer back on their authorised number before allowing them access. Also, system can have firewall to prevent unauthorised access into bank system. Firewall software is use to monitor and control all incoming and outgoing traffic to deny intruders gaining access to the information system. b) Malicious Code Malicious code like worms, Trojan horse program and viruses are written to penetrate a system in order to have access to confidential information or disrupting the bank network. Through the help of the code, Fraudster can enter the network of a bank without its knowledge and valuable information can be stolen in the process. This stolen information can be used to commit identity theft or fraud. This code attacks are very delicate in that they can replicate and spread themselves without human intervention. c) Intrusion This is a process through which an intruder has access to bank network. Usually, the intruders are employees of the bank who have gained access to the authentication information of a bank customer. Intruder could also be an external person who has acquires some skills to get the authentication information of the bank customer. When internal or external intruders have unauthorised access to bank network, vital information about customers can be obtained and later use to perpetrate frauds or commit crimes. To guard against this ugly incident, bank must restrict its employees to some areas of its network. d) Denial of services Banks nowadays rely on internet for effective communication within and outside organisations. In the process of communication, the bank is subjected to the risk of denial of services. Communication channels of the bank can be blocked, web page may be changed or the system employ to process online business transaction may be attacked. A denial of service attack is associated with an attempt by attacker to prevent legitimate users of a service from using that service. The situation forces the bank to close down services until everything return to normal. This kind of criminal activity was hardly experience until 1999 when the crime became cankerworms in our business environments. The effect of this criminal activity is very great most especially when bank so heavily depend on the internet for online business transactions. Huge amount of money could be lost to the fraudster through the attack. Attack on Amazon and Yahoo servers in the year 2000 was a good example. The servers of Yahoo w as engulfed with series of attacks and â€Å"The attack was estimated as costing  £ 300,000 in the lost advertising revenue alone† (Financial Time of November 17, 2000). Another popular of denial of service attack was witnessed in 2004. During this time, a group of fraudsters from Russian embarked on a number of denials of service attack on UK bookmaker. The attackers demanded for certain amount of money before they could stop the attack, but the organisation in question (bookmaker) was not ready to give them any money at that time leading to a great losses of about forty million pound. The effect was very terrible on financial position of the company that very year. e) Brand Abuse It involves sale of counterfeit goods like software application to exploit a well recognised brand name for commercial benefit. Fraudster can imbedded the name of reputable organisation into a bogus web page just to portrait the page as high rank one. People that search for this reputable organisation can be routed to the false web page where the counterfeit goods are sold. A lot of people have intention of buying genuine products and services but end up in buying counterfeit one through the brand abuse. The effect of this is that people pay high price for less quality goods and services. The brand abuse practice costs most UK organisations huge amount of money and cost continue to increase year in year out. People also are no longer sure that the goods and services buy over web pages are actually genuine one. Many people have been victims of counterfeit unknowingly but thinking that they have bought the original goods and services they intend to buy even at exorbitant price. f) Credit Card Fraud The use of credit card online has become a global phenomenal. This card is being use all over the world to make payment for goods or services purchase on internet, retail shops or restaurants. The proliferation use of credit card online makes the users expose to various forms of risks. The risk could be in form of using peoples personal information to open new accounts, hijacking existing accounts. g) Opening of new account After important details like name, date of birth, social security number is obtained, the fraudster can pretend to be another person in order to create new lines of credits. The victims name can be used to secure credit cards and it may not be known to victim that someone has taken credit card on his or her name. Some people in many cases get to know when they receive calls from debt collectors or when they apply for loan and it is not granted due to bad credit rating. Many people have been forced to pay debt they didnt actually own through this process. h) Hijacking account Hijacking existing account is another method use to commit credit card fraud. Existing account can be hijacked by altering important details of the victims such as personal identification number, passwords, billing or mailing address. The purpose of this is to take perfect control of someones account illegally. The original owner of the account may find it hard to regain the control of the account. Even if they regain the control, fraudsters might have wreck serious havoc on financial reputation of the original owner of the account. It takes victims some time and money before they could clear their names from this mess. i) Skimming It is very common in the restaurants, stores or automated Teller machine. Skimming is done through the use of palm-sized card -reading devices. This device is capable of swiping credit card information. It is very delicate in that it may not be noticed until the victims witness unsolicited charges on the statement account of their credit cards. Many of these devices can be planted into Automated Teller machine slots or strategic locations that are not visible to the people. The aim and objective of doing this is to illegally capture important details of targeted victims. The details collected through this method can be used to perpetrate frauds on customers accounts or use to commit crime in the name of the victims. j) Phishing Phishing is another method that thieves use to lure people to supply their personal information through false e-mail and web sites. Customers may receive bogus electronic mail through a web site telling them to update their details. The web site may look like that of normal bank they use to visit. But when they access this web site, their account numbers and passwords will be demanded for. Both password and account number are collected through this method and later use to siphon money from customers accounts or credit cards. Barclays Bank and some highly reputable organisations were a victim of the crime in 2003.This method of stealing is hardly to detect because the e-mail and web site are made so similar to that of original banks. The only preventive measure is for the banks to educate their customers to ignore such e-mail whenever they receive it. Although this will not totally wipe out the crime because many online customers will still respond to such e-mail but additional measur e like authentication which involves adding an extra field to a record with the contents of this field derived from the remainder of the record by applying an algorithm that has previously been agreed between the bank and customers will go a long way in countering this crime. Multiple passwords can also be employed to counter the problem. Furthermore, there are many more of internet threats around but this research work will focus majorly on identity theft and card authorisation. 2.4 IDENTITY THEFT According to available information, identity theft and identity fraud are not new crimes. Both have been in existent for a while and continue to be among the fastest growing crimes in the UK. These two crimes can be perpetrated without a thief even burgling into your home or have physical contact with your computer system. The problem is likely to get even worse because of economy recession that grips all the nations. Information gathered from banks reveal that insurance fraud is increase by 17% and identity fraud seems to be following the same pattern. If bank customer identity is compromised he or she may find it hard to have good access to a loan, credit card or mortgage until everything is resolved. We are all victims of these crimes. We eventually pay highest prices in shops, highest interest rate on mortgages and higher premium on our insurance policies for no other reasons than this problem of fraud. Government and corporate individual organisations have been making frantic efforts to reduce these crimes. But in spite of all these efforts, the rate of identity theft and identity fraud are yet to reduce and number of victims of these crimes are also increasing on alarming rate. According to (UK payments, the UK trade association for payments, 2008) card fraud losses total  £609.9m, online banking fraud losses  £52.5m and cheque fraud losses  £41.9m. Furthermore, of identity fraud in 2007 was quoted to be 65,043 according to CIFAS, the UKs fraud prevention service. The 2003 survey of Federal Trade Commission (FTC) indicated that about 3.25 million Americans had lodged complaints that their personal detail was illegitimately used to get credit cards, obtain loans, rent apartment, and enjoy medical facility and some time use to commit crimes. Also, more than 5 million Americans were victims of credit card frauds where personal detail was used to obtain lines of credit and twent y five million plus have been victim of identity theft. WHAT ARE IDENTITY THEFT AND IDENTITY FRAUD THEN? Identity Theft is situation where by an individuals personal information or confidential detail is steal by another person without their knowledge. But Identity fraud is committed when thieves use this information to secure credit, goods or other services in the name of targeted victim without his or her knowledge. Another definition describe identity theft as â€Å"anyone who knowingly transfers or uses, without lawful authority, any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual with the intent to commit or aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law† (1998 identity Theft Act, U.S public Law 105-318). 2.5 REASON FOR IDENTITY THEFT FRAUD Reports so far on various form of identity thefts indicated that fraudsters commit identity theft for a number of reasons. But the most common one are: a) Concealment Many people commit identity theft simply because they want to cover their past criminal records. Some people in the past have committed one crime or the other and want to cover them to avoid arrest. A very good example of this scenario was that of September eleven terrorist. â€Å"All 19 of the September 11th terrorist were involved in identity theft in some way† (Willox and Regan 2002) many people were wrongly arrested because their identities have been stolen. Also, a number of people commit identity theft because they want to hide their bad financial records which denied them access to essential banks products or services such as bank loans, mortgage, account opening or credit card. In some situations, identity theft can be committed to avoid payment of existing debts. These type of people may want to enjoy normal life again and the only way they can achieve this is to masquerade themselves under the identity of another person. The effects of these criminal activities are t hat warrant arrest and prosecution may be issued in the name of victim customer. b) Financial benefit Investigation conducted from various banks indicated that many fraud cases reported in the recent past revealed that people committing identity theft for financial gain. In some cases, thieves steal personal information of innocent persons to open a line of credit cards accounts. Along the line many goods and services can be purchased in the name of targeted victims. In the same manner, details of another person can be used to secure loan from bank and account abandon later after fraudsters might have make a lot of money from the accounts of victims. A friend narrated his experience where fraudster obtained his personal details to secure a loan of about  £10.000 from a commercial bank without his knowledge. The fraud discovered some months later when he received a letter from the bank that sum of  £10.000 plus accrued interest is due for payment in his account. The fraudsters have used his identity to have illegitimate financial gain. The case took him some legal battles and time before he could exonerate himself from this mess. c) Revenge Many banks have witnessed identity theft through the activities of their employees. Some employees of bank may collude with fraudsters to steal details of customers as retaliation to the termination of their appointments or the bad treatments they received from their employers. In this process, valuable banks information may be sold to competitors leading the bank to various litigations and financial lost. Also the reputation of the bank may be seriously damaged. The effect of this is decline in profits and low patronage of the customers. 2.6 TYPE OF IDENTITY THEFT Many Bank customers have been victims of identity theft by one way or the other and type of identity will largely depend on the definition giving to it. But the most prominent one is credit card. Information available reveals that credit card fraud on internet has been seriously increase due to the opportunity offered by new improved internet technology. Apart from credit card fraud, there are other types of identity theft such as extortion, phishing, financial scam, avoiding arrest, organized identity theft and many others. a) Extortion Fraudsters have many ways of extorting money from banks and customers but the two common one are cyber squatting and the threat of leaking customers information. Cyber- squatting, this method of extortion related to registering a bogus internet domain to

Confucianism and the west :: essays research papers

Throughout the course of the first half of the semester we have taken a broad scope of the major aspects of the phenomena that has been the recent history of China. When studying Modern China a common thread of ethical, cultural, religious, political, social, and economic aspects can be analyzed in relationship to Confucianism and its affect on international relations. These aspects show that historically (particularly the nineteenth century) China initially resisted the acceptance of Western influence in order to maintain its high level of uniqueness, isolation, and Confucianism which has bred its prosperity and demise. From its early to modern societies it was abundantly clear that China would be a largely Confucian-based society. Confucianism is a major system of thought in China. Developed from the teachings of Confucius and his disciples, their ideals centered on concern with the principles of good conduct, practical wisdom, and proper social relationships. Confucianism has influenced the Chinese attitude toward life, and set the patterns of living and standards of social value. The keynote of Confucian ethics is jen, variously translated as "love," "goodness," "humanity" and â€Å"respect for your neighbor† (http://www.formosa-kingdom.com/chinese/). Jen is a supreme virtue representing human qualities at their best. In human relations, jen is manifested in chung, or faithfulness to oneself and others. Other important Confucian virtues include righteousness, propriety, integrity, and filial piety. It is in this light that thoughts of Confucius can so la rgely affect all facets of life. Confucianism can affect and determine the ethical viewpoints of entire nations. The ideal social structure of East Asia was that of a Confucian hierarchy followed individually by a strong familial structure. Chinese society was modeled in a true Confucian structure with governmental workers being the elite, followed by the crop producing farmers, then the merchants, and finally soldiers. Chinese ethics place an enormous emphasis upon respect. It was my understanding from discussion and research that a Confucian society is primarily based on honor and the ideology that everything is done in the best interests of the family or society. Confucius states in the first article of his constitution that: â€Å"Harmony should be held a treasure, and the person who eschews selfish opposition should receive honor† (East Asia, pg. 64 from last year). This was the case in the book Thousand Pieces of Gold when a young girl named Lulu virtually sacrifices her entire life for the greater good .

Friday, July 19, 2019

Electrolysis Investigation :: Papers

Electrolysis Investigation Aim To investigate how voltage affects the amount of a copper (Cu) deposited during electrolysis of copper sulphate solution (CuSO4). Variables ========= TEMPERATURE - Approximately 20ÂÂ ° centigrade.The higher the temperature, the faster the ions move through the solution. Thus, more copper is deposited in the given time period. ELECTROLYTE (CONCENTRATION) - 100g per litre. The denser the solution, the slower the reaction. The slower the reaction, the less copper is deposited in the given time period. VOLTAGE - (Input / Key Variable) 1-5 volts. The higher the voltage, the faster the ions move. The faster ions move, the more copper is deposited in the given time period. TIME - 1 minute. The longer the ions have to move, the more copper is deposited. ELECTRODES (AREA) - 211.2cmÂÂ ³. The larger the electrode, the more copper can be deposited on it and faster. ELECTRODES (DISTANCE APART) - 5cm. The further apart the electrodes, the further the ions have to travel, and so it takes longer for the copper to be deposited and the less copper can be deposited in the given time period. Prediction I predict that the higher the voltage, the faster the ions in the copper sulphate solution will move and so deposit more copper at the cathode in the given time period. If I decrease the voltage less copper will be deposited. Below is some scientific theory to back up my prediction. Scientific Theory Electrolysis is the process of decomposing compounds by electrical energy. An element is produced at each electrode. In my experiment the copper sulphate will start to decompose. At the cathode copper will be formed. Oxygen will be formed at the anode. This causes the anode to wear away while the cathode gains mass. According to Faraday's second law of electrolysis, "The quantity of a substance that is electrolysed is proportional to the quantity of the electricity used." It follows that the speed at which a substance is