Tuesday, November 26, 2019

Information Technology Essay Example

Information Technology Essay Example Information Technology Essay Information Technology Essay REPORT ON ATTACHMENT AT KENYA POWER AND LIGHTING COMPANY FOR THE PERIOD SEPTEMBER TO NOVEMBER 2009 NAME OF STUDENT: LESIAMITO DUNCAN SAIDIMU REGISTRATION NO: MAC-1-295-2/2007 NAME OF LECTURER: MR. RONALD WANYONYI Report submitted to the department of Computer information systems in particular fulfillment of the requirement for the bachelors of Science degree in computer information systems. SUBMISSION DATE: 9th December 2009 DECLARATION: I declare that this is my original work and has not been presented anywhere else to the best of my knowledge. Name†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. Signature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Date†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ CONFIRMATION BY THE SUPERVISOR I confirm work has not been presented anywhere else to the best of my knowledge. Name†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Signature†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Date†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Dedication I dedicate this report to my family and colleagues both in attachment and school who have been very supportive throughout the period I have been on my attachment. Acknowledgements I would wish to appreciate the greatly indebted support from the KPLC ITT staff. They offered a warm reception of orientation in all operation and greatly dedicated their precious effort guiding me throughout my attachment period. I also thank my supervisor Mr. Wanyonyi for guiding and assisting during the attachment period and in writing this report. I thank the Almighty father for the wonderful opportunity and strength during this period. Abstract This is report on my internship that I undertook in Kenya Power and Lighting Co. Ltd Central Rift region IT T department for the period September-November 2009. It entails the activities and duties assigned to me during this period they involved printer fault diagnosis and repair, software installation and configuration, preventive maintenance, taking of inventory and hardware repair and replacement. It also came across different software, hardware and Information Systems that I used, repaired, installed or configured; these included Ics, Dcs, Tms among others. The attachment was about implementing the theoretical skills gained in the class practically as well as developing a room for further research and exchange of ideas. I got to interact with many people who helped me educationally, emotionally and socially I company should decentralize some of administration support activities to the branch offices in order to reduce delays the delivery of services. Table of content Acknowledgements†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Abstract. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦ Table of content. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦ Dedication†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. List of Symbols and Their Respective Meanings. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦ CHAPTER ONE Introduction. †¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦ Location. †¦ †¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦. †¦Ã¢â‚¬ ¦ Information Technology. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦.. †¦ †¦ Telecommunication†¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦. Kenya Power and Lighting Ltd Vision Statement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. †¦Ã¢â‚¬ ¦.. †¦ Kenya Power and Lighting Ltd Mission statement†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦.. †¦ KPLC core values. . †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. †¦. †¦ †¦ KPLC Internal Motto. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦.. †¦.. †¦ KPLC External Motto. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦. †¦.. †¦Ã¢â‚¬ ¦. KPLC’S ROLE†¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Organization Details. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦.. †¦Ã¢â‚¬ ¦ Transmission and distribution†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦ Demand/ supply of electricity:†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Organizational Structure Central Rift (Nakuru). †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ IT T Policy Document. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Objectives of IT T†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦ Vision of IT T Division†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦. †¦Ã¢â‚¬ ¦.. †¦ Definition of IT T Policy.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ CHAPTER TWO Duties /Activities. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Information Technology Department. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Data Network.. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Duties†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. Software†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Hardware†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Information Systems†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ CHAPTER THREE Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. Significance of the course to the attachment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Significance of the course to the attachment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Critiques. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. †¦Ã¢â‚¬ ¦. †¦. Recommendations. †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦. List of symbols and their respective meanings LCA: Local Collection Application DCS: Design and Construction System ICS: Integrated Customer Service CPU: Central Processing Unit PC: Personal Computer MS Exchange: Microsoft Exchange LRA: Local Reading Application UPS: Uninterrupted Power Supply HHS: -Hand Held Set SCADA: -System Control and Data Acquisition RTU: -Remote Terminal Unit DTU: -Data Terminal Unit ITT Information Technology and Telecommunication TKL:- Telkom Kenya. KDN: -Kenya Data Network. 1. CHAPTER ONE 1. 1 Introduction. The Kenya Power and Lighting Company Ltd. (KPLC) is a limited liability company responsible of electricity transmission, distribution and retailing in Kenya. The company is a national electric utility, managing electric, licensing, billing, emergency electricity service and customer relations. It is a Public limited company listed at the Nairobi Stock Exchange (NSE) with the Government of Kenya owning 51% and 49% by the public in form of share ownership. KPLC was incorporated in 1922 as the East African Power Lighting Company (EAPL). It changed its name to The Kenya Power and Lighting Company Ltd. (KPLC) in 1983. Before a major power sector restructuring in 1997, KPLC managed all generating stations on behalf of the Government. Currently, KPLC manages some diesel-generating stations which are owned by the government known as Independent power producers (IPP), which are isolated from the national grid in marginalized areas such as Merti, Lodwar and Baragoi. 1. 2 Contacts Central Office Address: Kenya power and Lighting Company, P. O Box 30099, Nairobi. Tel: 020-32013201, Website: www. plc. co. ke Nakuru Office Address. Kenya power and Lighting Company. P. O Box 104-20100. Nakuru. Tel 051-2211594 Cell: 073560006 0720860006 Website: www. kplc. co. ke 1. 3 Location. The Central office is Located at Stima Plaza on Kolobot Road, Nairobi. The company’s main functions are carried out under various divisions. These include customer service, Distribution (Design and construction, Operations and maintenance), Energy Transmission, Human Resources Administration, Transport Supplies, Finance, Information Technology and Telecommunication. Internal Audit, Protective Services and Communications departments fall directly under the Managing Director. The company has six administrative areas. These are; Nairobi Region, Mt Kenya Region, Coast Region, North Rift Region, Central Rift Region and West-Kenya Region. All services offered by the main divisions are replicated in each area, which are headed by functional heads who report to the Regional Manager. A Kenya Power And Lighting Company (Central Rift) office is located at Electricity House along Moi Road next to Provincial Commissioner Offices in Nakuru. It contains departmental offices within the various divisions, which perform different functions. An example of these departments is the IT T department which handles ICT functions within the company. The Central Rift Region has other offices linked to it, represented diagrammatically as below: |Ravine | |Maralal | |Lanet | | | | | |NAKURU | |Narok | |Nyahururu | |Naivasha | KPLC Vision Statement. To achieve world class status as a quality service business enterprise so as to be the first choice supplier of electrical energy in a competitive environment. † KPLC Mission statement. â€Å"To efficiently transmit and distribute high quality electricity throughout Kenya at cost effective tariffs; to achieve the highest standards of customer service; and to ensure the company’s long-term technical and financial viability†. KPLC core values. Customer driven Teamwork Results driven People focused Empowerment Innovation Professionalism Equal opportunity Ethics/Int egrity Social responsibility Environment friendly KPLC Internal Motto. â€Å"My company my pride† KPLC External Motto. â€Å"On public Service† KPLC’S Role. KPLC owns and operates the entire electricity transmission and distribution system in Kenya, and sells electricity to over 1 million customers. The company’s key operations include: ? Planning, designing, construction and maintenance of the distribution network. ? Customer service. ? Ensuring sufficient transmission capacity to meet demand 1. 4 Organization Details 1. 4. 1Transmission and distribution KPLC is responsible for ensuring ample transmission capacity to maintain supply and facilitate quality electricity. It also develops and maintains the distribution networks and satisfactory services to the customer. The combined network of transmission and Distribution lines stretch for more than 23,000 kilometers across the country. Electricity is transmitted at high voltages. In Kenya, electrical power is generated between 11 and 15kV. The electricity is then stepped up to 220kV or 132kV for transmission to sub-stations large power users. It is then stepped down to 66kV, 33kV and 11kV at various feeder points for distribution to consumers. Large industrial and commercial customers are supplied at these high voltages. The electricity is stepped down to 415v/240v for other consumers 1. 4. 2 Demand and Supply of electricity: Demand for electricity in Kenya stands at around 825 MW. However, the country has an installed generating capacity of more than 1,200 MW, though sometimes about 15% of this is usually unavailable due to drought and shutdowns of generating plants to facilitate repairs and Maintenance. 1. 4. 3 Organizational Structure Central Rift (Nakuru) 1. 5 IT Telecommunication DIVISION IT T is a division is divided into two departments; IT and telecommunication. Information Technology. This department handles all computer hardware (Pc’s and servers), data Communication, Software issues and advices on all the matters that’s relate to IT. Telecommunication. The function of this Department is to provide efficient and reliable communication system within the company and other regions. This Includes Radio Communication ,Telephony and Communication through PLC. 1. 6 IT T Policy Document. 1. 6. 1 Introduction. Since the first edition was written in Year 2002, a number of improvements have been made and the ICT technology keeps changing for the better. This second edition of the ICT Policy incorporates the changes that have been realized so far. Included especially is the â€Å"IT Review and Action Plan† document, dated October 31, 2006. Information and Communications Technology Policy addresses security issues and how to effectively apply and maintain information systems, thereby facilitating protection of critical, valuable and confidential information together with its associated systems. Most people are likely to recognize the impact and severity of the loss or theft of confidential designs for a new product. However they do not always recognize the potential risk, and consequential result, of seemingly innocent activities, such as copying software or copying the corporate database onto their laptop computer or not documenting changes made to their systems. The purchase and installation of hardware and software requires those involved to consider carefully the Information Security issues involved in this process. Careful consideration of the companys business needs is paramount, as it is expensive to make subsequent changes. Analysis of user requirements versus the various benchmarks test results, will establish the best choice of server/software to be purchased. Installation of new equipment must be properly considered and planned to avoid unnecessary disruption and to ensure that the IT T Policy issues are adequately covered. The issue of IT consumables is looked into. These are expensive and should be properly controlled both from an expense perspective as well as an Information Security perspective. Valuable items should always be kept in a secure environment to avoid damage or loss. 1. 2 Objectives of IT . To provide efficient, effective and reliable communication systems that meets and exceeds KPLC voice and data requirements. To ensure availability of the communications systems that exceeds the set target of 97% To continually improve the telecommunication systems to meet and conform to the current world standards. To ensure mnaximum customer satisfaction in the IT division. 1. 6. 3 Vision for IT T Division. We strive to provide nothing but the best means of data and telecommunications services to the company and the country as a whole. 1. 6. Definition of IT T Policy. A set of rules, regulations, procedures and plans of action for administration of equipment resources, and services in the IT T division. CHAPTER TWO. 2. 1 Duties and Activities. During my attachment in the Information Technology and Telecommunications (IT) division. the following are among the duties I was designated to perform. Software Installation. Printer Fault Diagnosis and Repairs. Antivirus Installation. Preventive Maintenance. Networking. User support. Taking of inventory. Repair and maintenance of various hardware. j[ 2. 2 SOFTWARES The following are the software used in the various departments and which I was exposed to in installation and support. Microsoft Windows Server 2003. McAfee Version 8. 5i Microsoft office 2007 Power Builder Oracle 9i SQL Server AutoCAD. SPS (Strategic Planning System). Adobe reader 2. 3 Hardware PCs Ups. Server: Cisco routers, switches Printers. HHS. Network cables. 2. 4 Information systems a). ICS (Integrated Customer Service Application) This is an online System with a centralized Database situated at the Head office. Used by Cashiers, Customer Service Officers, and Meter Reading. The Software integrates a number of functions that is Contracting New Customers, Billing of Customer, Cash Collection etc. b). DCS Online(Design and Construction System) This is an online system interfaced with ICS System which Design Engineers Use to do costing of Service line Applications. The same is also used for booking of Service line construction Materials from Stores Section. c). DCS Offline (Design and Construction System offline). An Offline system used by Designers to download jobs ,design lines and cost projects and later upload the jobs to the DCS online system after they complete the job. d). LCA (Local Collection Application) This is an offline Cash Collection Application mainly used by Cashiers when the ICS System Fails. The transactions are a stored locally on a Batch file which is later downloaded to the Central Database. e). TMS (Transport Management System) This is a system used by the Transport Department and Costing Section to keep records of company vehicles and their maintenance costs. Also used to keep records on mileage returns and labor cost returns. f). LRA (Local Reading Application) This is a system designed to upload and download meter reading records from the ICS system for billing. The HHS set is used for this purpose connected via COM1 port. This system is used by the meter-reading section under customer service department. This system helps to determine how much the customer has consumed and hence the amount to be charged. g). Medicare Application. This is a system used to keep the medical expenditure records of the KPLC employees and their dependants. It is used by the human resource administration department. h). IMS (Incidence Management System) This is an Online System Used by the Operation and Maintenance Department to keep track of Temporary Power line Break downs and customer complaint on Blackouts and Voltage fluctuation. ). EIS (Executive Information System) This is a system interfaced with all other company Systems and it provides the executive with summarized reports to facilitate Decision making and Policy formulation. j). MDB (Management Database System) This is a system that summaries all the operations in ICS System and presents it in a report form. Used by management to monitor Performance. k). SAP (Sys tem Application and Products) This is a System used in the Finance Procurement Department. It keeps Supplier Records, Payroll Management, and Company Budget Management etc. l). Scada This is a system that is used for Tele operation on the power station. This includes Telemetry and Switching, by the engineers at the National control center to all the manned and unmanned station m). Ripples System This system is used to control street lighting and water heaters. This is achieved by automatically varying the frequencies on the power 2. 5 Data Network. The KPLC C/Rift has an extensive data network thus enabling it to have distributed systems where users can access network resources such as the databases that are centralized and other network resources such as Printers. I was involved in installation of networks that is trucking and terminations cables and labeling of data points, configuration installation of network Equipments such as the routers and switches of the cabinets. WAN for C/Rift TKL KDN At the end of each modem there is a Router and a Switch connected to it to form a network. Each Modem is connected to the Router through a V. 35 Cable CHAPTER THREE 3. 1 Conclusion. During my internship I have really gained a lot and I really endeavored the industrial attachment basically because it granted me an exposure and a chance to evaluate my potential. I was able to learn about many systems and practices in the IT world. I also got an opportunity to travel to different areas and interact with other people. I got used to working environment. 3. 2 Significance of the program to the attachment The program equipped me with the theoretical base which I was able to relate to the practical setting. I also gained interpersonal skills and wide knowledge due to the fact that the program offers various from diverse fields. 3. 3 Significance of the student learning I was able to learn more about hardware, software and the information systems used in the real life. I able to interact with other staff and students on attachment from various institutions to share ideas. 3. 4 Critiques. During my internship period I noted a few IT practices that hindered smooth running of operations in the IT T Division This includes these following, Most of the users are not are willing to use the helpdesk system thus hindering proper service delivery. Many system administration support are centralized at the regional office thus causing delays in service delivery. Many of the users are not conversant with basic computer operation. Use of old machine which are very slow. The company had most of the hardware and software that are in the IT world so I gained enough practical. The company offered attachment places to many student and so the was interaction among different students. 3. 5 Recommendations. 1. The organization should have tint windows or blenders to protect machines from direct sunlight 2. Security measurements should be implemented 3. Single serv er unit should be provided to help in the machine management in all labs 4. Tables in the labs are so uncomfortable in the sense that when you put the sit inside you are unable to put legs Reference 1. KPLC website www. kplc. co. ke 2. Stima journal Regional Manager Asst Manager Energy transmission Eng. Revenue finance officer IT/T Eng Customer service Eng. Distribution Eng HR/Adm officer Transport Eng. Asst. HR Administration Telecom Asst distributor engineer Asst customer service IT support Asst Energy Eng. Asst accountant Customer service clerk Energy transmission technician Revenue accountant Distributor technician DTU DTU Gilgil Maralal Ravine Narok Nku Depot Lanet Nyahururu Molo Naivasha Nakuru R O U T E R

Friday, November 22, 2019

Narrative Essay Example College

Narrative Essay Example College Typically, narrative essays are not very popular in school and in college. You are more likely to be assigned to write evaluation, argumentative or persuasive essays. So if you feel you do not know where to start from, you might need to find a good narrative essay example college. It will give you a general idea of how your own paper should be like. If you are stuck with your paper and you cannot write a single word, if you feel frustrated because of the close deadline, do not waste time and contact us. We know what to do to save you out of trouble; we work 24/7 to provide you with qualified academic writing assistance whenever you need it. Students’ success is our main aim. Our habitual clients appreciate our efforts and come back again with the new assignments. Well, what useful ideas can you find in a good narrative essay example college? Write a story You are not required to do much research. Typically, when assigning this kind of paper, your teacher wants to evaluate your command of written English, your knowledge of grammar and punctuation. So, just think about a story you can present in your paper. Probably, if you search in your memory for a while, you will be able to recollect a lot of fascinating childhood stories. You can write a funny story about your pet, or a sad story about undivided love, or anything you find interesting. You have a chance to entertain your teacher and yourself, so why not use it? Mind your language If you want to include a dialogue in your narration in order to create a vivid picture in your reader’ mind, you can use colloquial language. However, in the rest of the paper avoid using colloquial words, slang, short word forms etc. While writing, keep at the forefront of your mind that your work is still an academic paper, so it is important to follow the rules of academic writing. Correct grammar and punctuation are very important for success of your paper. Get feedback As you see from the narrative essay example college you have found online, this task is creative writing, so it is important to get response of people whose opinion you can trust. For example, read the paper to your parents, they can probably give you some useful hints on how to improve your paper. Try to produce the best paper you possibly can; rewrite it until you see it is almost perfect. If you are deeply satisfied with the result of your thorough work, your teacher will definitely like it too.

Thursday, November 21, 2019

Electronic diplomacy Essay Example | Topics and Well Written Essays - 2500 words

Electronic diplomacy - Essay Example For them to be in touch with the world diplomats have utilized the use of facebook, YouTube, Twitter, and the social media network of the country. Using the social media network, the diplomats can easily address the audience with the specific massage they want to convey to them. This is to mean that the diplomats need not to travel up to be the audience are for him or her to deliver the massage hence reducing the mobility (Gaida Jeanette, 2013). The incising use of E-diplomacy has enabled the people in the places that cannot be reached to understand the stand of the government. For example if the country is being faced with drought or hunger in some region of the country. E-diplomacy can be utilized to inform the affected people on the government plan towards solving the drought or the hanger issue. The processing of visa documents have been simplified by e-diplomacy tools furthermore it has facilitated the direct with citizens who are at different countries (IRM’s Office of eDiplomacy, n.d). In case of the occurrence of any emergency, e-diplomacy has provided foreign citizens in a given country a chance to communicate with there respective consultants or state embassies. E-diplomacy discussion forum may provide an opportunity for diplomats to hold a free-wheeling debate and provide inputs that are valuable on the issues of foreign policy. The Smartphone apps enable the citizens to access information on passport norms and the initiatives of foreign policy. Secure visual platforms with safety features that are stringent have been availed to enable discussion confidentiality between specific diplomats. For example in the perspective of India, the ministry flagship publication that is printed in fourteen different languages and distributed among the Indian missions that is abroad currently have a version that is digital. Furthermore, the publication will be availed in a digital magazine store of a dedicated channel which will

Tuesday, November 19, 2019

Case Analysis Essay Example | Topics and Well Written Essays - 750 words - 1

Case Analysis - Essay Example Yale University determined in a recent study that incidences of weight discrimination rivals race discrimination (the top charge filed with the Equal Employment Opportunity Commission each year), and that women are twice as likely to be discriminated against as are men, and several such claims have been successfully pursued in court. Although federal employment laws and state laws, save Michigan, do not explicitly prohibit weight discrimination, there are however circumstances wherein discriminating according to weight falls under the coverage of the Americans with Disabilities Act (Personnel Legal Alert, 2008). The following are among the circumstances wherein discrimination claims may result based on obesity as a protected characteristic under this Act: In the case of Dr. Soysa, we are not given any information about the possible conditions attendant to her obesity, but for the purpose of avoiding litigation, it would be safer to assume that diabetes, heart disease or hypertension may be present. In this case, the Hospital, as employer, may not use her obesity as reason for forgoing awarding her the promotion. There are two pieces of legislation that have to do with discriminating according to age. The Age Discrimination in Employment Act of 1967 (ADEA) applies to employees 40 years of age or older, working for employers of 20 or more employees (EEOC, 2008). The Age Discrimination Act of 1975 prohibits discrimination on the basis of age in programs and activities receiving federal financial assistance. The Act applies to all ages (DOL, 2010). The ADEA is clearly not applicable here because Dr. Soysa is not being discriminated because she is too old (40 or above), but because she was supposedly â€Å"too young†. And unless the hospital falls under â€Å"programs and activities receiving federal financial assistance†, not

Sunday, November 17, 2019

Phillosophy Teaching Essay Example for Free

Phillosophy Teaching Essay At daybreak on the morning of Friday, August 3 1492, an Italian adventurer named Christopher Columbus set sail from Spain to find a new way from Europe to Asia. His aim was to open up a sorter trade route between the two continents. In Asia, he intended to load his three small ships with silks, spices and gold, and sail back to Europe a rich man. Columbus first sailed south to the Canary Islands. Then he turned west across the unknown waters of the mid-Atlantic Ocean. Ten weeks after leaving Spain, on the morning of October 12, he stepped ashore on the beach of low Sandy Island. He named the island San Salvador – Holy Savior. Columbus believed that he had landed in the Indies, a group of Inlands close to the mainland of India. For this reason he called the friendly, brown-skind people who greeted him los Indios – Indians. In fact, Columbus was not near India. It was not the edge of Asia that he had reached, but islands off the shores of a new continent. Europeans would soon name the new continent America, but for many years they went on calling its inhabitants Indians. Only recently have these first Americans been described more accurately as Native Americans or Amerindians. There were many different groups of Amerindians. Those north of Mexico, in what is now the United States on Canada, were scattered across the grasslands and forests in separate groups called tribes. These tribes followed very different ways of life. Some were hunters, some were farmers. Some were peaceful, others warlike. They spoke over three hundred separate languages, some of which were as different from one another as English is from Chinese. Europeans called America the New World. But it was not new to the Amerindians. Their ancestors had already been living there for maybe 50000 years when Columbus stepped on to the beach in San Salvador. We say maybe because nobody is completely sure. Scientists believe that the distant ancestors of the Amerindians came to America from Asia. This happened, they say, during the earth’s last ice age, long before people began to make written records. At that time a bridge of ice joined Asia to America across what is now the Bering strait. Hunters from Siberia crossed this bridge into Alaska. From Alaska the hunters moved south and east across America, following herds of caribou and buffalo as the animals went from one feeding ground to the next. Maybe 12000 years ago, descendants of these first Americans were crossing the isthmus of Panama into south America. About 5000 years later their camp fires were burning on the frozen southern tip of the continent, now called Tierra del fuego – the Land of fire. For many centuries early Amerindians lived as wandering hunters and gatherers of food. Then a more settled way of life began. People living in highland areas of what is now Mexico found a wild grass with tiny seeds that were good to eat. These people became America’s first farmers. They cultivated the wild grass with great care to make its seeds larger. Eventually it became Indian corn, or maze. Other cultivated plant foods were developed. By 5000 BC Amerindians in Mexico were growing and eating beans, squash and peppers. The Pueblo people of present day Arizona and New Mexico were the best organized of the Amerindians farming people. They lived in groups of villages, or in towns which were built for safety on the sides and top of the cliffs. They shared terraced buildings made of adobe ( mud and straw ) bricks, dried in the sun. Some of these buildings contained as many as 800 rooms, crowded together on top of one another. The Pueblo made clothing and blankets from cotton which grew wild in the surrounding deserts. On their feet they wore boot-shaped leather moccasins to protect their legs against the sharp rocks and cactus plants of the desert. For food the grow crops of maize and beans. Irrigation made them successful as farmers. Long before Europeans came to America and Pueblo were building networks of canals across the deserts to bring water to their fields. In one desert valley modern archaeologists have traced canals and ditches which enable the Pueblo to irrigate 250000 acres of farmland. A people called the apache were the neighbors of the Pueblo. The apache never became settled farmers. They wandered the deserts and mountains in small bands, hunting deer and gathering wild plants, nuts and roots. They also obtained food by raiding their Pueblo neighbors and stealing it. The Apache were fierce and warlike, and they were much feared by the Pueblo. The Iroquois were a group of tribes – a nation- who lived far away from the Pueblo and the Apache in the thick woods of northeastern North America. Like the Pueblo, they were skilled farmers. In fields cleared from the forest they worked together growing beans, squash and twelve different varieties of maiz. They were also hunters and fishermen. They used birch bark canoes to carry them swiftly along the rivers and lakes of their forest homeland. The Iroquois lived in permanent villages, in long wooden huts with barrel-shaped roofs. These huts were made from a framework of saplings covered by sheets of elm bark. Each family had its own apartment on either side of a central hall. The Iroquois were fierce warriors. They were as feared by their neighbors as the Apache of the western deserts were feared by theirs. Around their huts they build strong wooden stockades to protect their villages from enemies. Eager to win a glory for their tribe and fame and honor for themselves, they often fought one another. From boyhood on, male Iroquois were taught to fear neither pain nor death. Bravery in battle was the surest way for a warrior to win respect and a high position in his tribe. Many miles to the west, on the vast plains of grass that stretched from the Mississippi River to the Rocky Mountains, there was another warrior nation. This group called themselves Dakota, which means allies. But they were better known by the name which other Amerindians gave to them – Sioux, which means enemies. Te Sioux grew no crops and built no houses. For food, for shelter and for clothing they depended upon the buffalo. Millions of these large, slow- moving animals wandered across the western grasslands in vast herds. When the buffalo moved, the Sioux moved.

Thursday, November 14, 2019

Creating a Successful Community Service Project :: Community Service Essays

Introduction Our class at State University has been tasked with creating and implementing a community-service project. A community-service project refers to a service that a person or group performs for the benefit of his or her local community. The team which I was part of decided to sponsor a Mother’s Day spaghetti dinner for the athletic department at a local Christian school. The funds would be used exclusively to build dug-outs for the girls softball team at a small private Christian school located in our town. The Christian school serves our community by providing a preschool program for children 3 and 4. It also conducts school for K-5 through 12th grade. Our team is made up of four people. The team began the decision making process by first exploring the parameters involved in a community project and the possibilities to work towards a worthy cause, while applying organizational behavior principles. The spaghetti dinner seemed perfect for our purpose of collecting money to build the girls softball team some dugouts. We wanted to engage in a community project that included certain characteristics such as an activity that would produce long-lasting benefits for the community. The team also wanted an uplifting and positive experience for all involved and a process that included a variety of challenges which would demonstrate our individual talents. As a team we all participated in the decision making for the entire project. Each participant showed leadership and demonstrated motivation to get the project underway and completed with a successful turnout.   Ã‚  Ã‚  Ã‚  Ã‚  Once the team came up with a general consensus for the project, the decision making was shared at all levels. Sometimes, the team had to rethink certain approaches quickly, for example by becoming more persistant and persuasive with merchants. As the dead line for the dinner approached we needed to take into consideration all factors surrounding the cause and try and get as much as possible from each merchant. In most cases, there was reluctance about donating something to a group that was not very well known and in other cases there was resistance in general to donating at all. Many merchants wouldn’t donate without first receiving a request in writing, so we created a letter designed to overcome this obsticle. We have included a copy of this letter at the end of this paper for your review. The team had multiple different personality types and traits that would allow us to pull on multiple strengths from different team members. Creating a Successful Community Service Project :: Community Service Essays Introduction Our class at State University has been tasked with creating and implementing a community-service project. A community-service project refers to a service that a person or group performs for the benefit of his or her local community. The team which I was part of decided to sponsor a Mother’s Day spaghetti dinner for the athletic department at a local Christian school. The funds would be used exclusively to build dug-outs for the girls softball team at a small private Christian school located in our town. The Christian school serves our community by providing a preschool program for children 3 and 4. It also conducts school for K-5 through 12th grade. Our team is made up of four people. The team began the decision making process by first exploring the parameters involved in a community project and the possibilities to work towards a worthy cause, while applying organizational behavior principles. The spaghetti dinner seemed perfect for our purpose of collecting money to build the girls softball team some dugouts. We wanted to engage in a community project that included certain characteristics such as an activity that would produce long-lasting benefits for the community. The team also wanted an uplifting and positive experience for all involved and a process that included a variety of challenges which would demonstrate our individual talents. As a team we all participated in the decision making for the entire project. Each participant showed leadership and demonstrated motivation to get the project underway and completed with a successful turnout.   Ã‚  Ã‚  Ã‚  Ã‚  Once the team came up with a general consensus for the project, the decision making was shared at all levels. Sometimes, the team had to rethink certain approaches quickly, for example by becoming more persistant and persuasive with merchants. As the dead line for the dinner approached we needed to take into consideration all factors surrounding the cause and try and get as much as possible from each merchant. In most cases, there was reluctance about donating something to a group that was not very well known and in other cases there was resistance in general to donating at all. Many merchants wouldn’t donate without first receiving a request in writing, so we created a letter designed to overcome this obsticle. We have included a copy of this letter at the end of this paper for your review. The team had multiple different personality types and traits that would allow us to pull on multiple strengths from different team members.

Tuesday, November 12, 2019

Citizens Have to a Guaranteed Minimum Income in a Democratic Society Essay

â€Å"Although abuse of the system are inevitable, social welfare payments are essential to protect the rights citizens have to a guaranteed minimum income in a democratic society† Discuss. Social welfare is an essential element of an advanced society. Good systems are always abused, but that does not mean they are faulty. In my opinion, the two main reasons why welfare payments are necessary are as follows: First of all, critics forget that there are many forms of welfare besides payments to the unemployed. Their negative opinions harm those who are not capable of earning a wage, such as single-parent mothers, the disabled, and the sick. Moreover, the unemployed have the right to an income, too. They are not always at fault for not having a job, and in most cases the tax they have paid in the past entitles them to assistance. The second reason is that crime increases when people have no means of support. The desperately poor inevitably turn to crime, which is not only dangerous but costly. Policing the streets is more expensive than providing welfare. A policeman’s wage is four or five times higher than a â€Å"dole† payment. Certain members of society believe that people should look after themselves. They point out that welfare increases dependency on others and destroys dignity. This may be true, but in the case of the unemployed, the relief payments are usually temporary. It is surely the fault of the government if there are long-term unemployed. Welfare critics also believe that it is the responsibility of a victim’s family to provide financial assistance. However, it is too expensive to provide complete help for a severely disabled person. To conclude, it is vital to understand the need for welfare in a modern democratic society. Without welfare payments the poor are destined to become poorer. The first duty of a government is to provide a financial safety net for all disadvantaged persons, and that includes those without work.

Saturday, November 9, 2019

Plato biography

Greece had given to us many ideas, inventions and genial persons, and now days it is difficult to imagine our world without them. One of the most famous names of that age was Plato. He was philosopher, mathematic and teacher. Never the less, a few persons know why actually he was so famous. So, do you know where words â€Å"Academy' and Ð’Â «BenefitÐ’Â » came from or who created â€Å"Metaphysics† as field of science?Unfortunately, the extant data, which showed dates and place of Plat's definitely were sweep away by wind of history, but sorority of historians and sources indicate what it was in period between 429 to 423 BC in Athens. As well as we know, Athens was city-state in Ancient Greece, also many historians calling it â€Å"Heart of Greece† or â€Å"Cradle of knowledge†. We can conclude that place of born play an important role at formation of Plat's personality, along with his family was rich and very influential.High social status of his family gave to him opportunity to have best education. As Plato said lately: quickness of mind and modesty as a boy, and the â€Å"first fruits of his youth infused with hard work and love of duty†, and he had learned grammar, music, gymnastic and philosophy. Until 409 BC, Plato was studying at his teacher Socrates; moreover Socrates had big influence at his views of life. Plato was loyal follower and disciple of his teacher, also he created all main ideas with Socratic help. From 409 BC to 404 BC, Plato was in military service.In 403 BC, he returned to Athens, and he was trying himself at political career. Unfortunately, In 399 BC his teacher and friend Socrates had died. It was as knife to Palates back. After this tragic event, Plato disappointed In politics, he and there follower of Socrates left Athens and started to travel. As well as we can see from historical sources Plato travel was from 399 BC to 387 BC, during his travel he visited Italy, Libya, Serene and Egypt, while he was writing and exchanging of knowledge with other great scientists and philosopher.In the year 387 BC, then he came back to Athens, Plato founded his school and called Academy. This Academy gave to us a lot of great people, and one of them was Aristotle. In 367 BC, Plato arrived to Syracuse and become a personal tutor of Dionysus II. Furthermore, Plato reamed about state where Philosophers will have reins of government, but not bowl with poison. Unfortunately, the war broke his utopians dreams In 360 BC, after that he came back to Athens and stayed there until his dead In 347 BC.Plato biography By Tossing-Too career. Unfortunately, in 399 BC his teacher and friend Socrates had died. It was as knife to Plat's back. After this tragic event, Plato disappointed in politics, he and In 367 SC, Plato with poison. Unfortunately, the war broke his utopians dreams in 360 BC, after that he came back to Athens and stayed there until his dead in 347 BC.

Thursday, November 7, 2019

Newspaper article on the events at Deir Yassin.

Newspaper article on the events at Deir Yassin. What really happened in Deir Yassin? Who was responsible? What has its effect been? Read on to find out...Early in the morning of Friday, April 9th, 1948, commandos of the Irgun, headed by Menachem Begin, and the Stern Gang attacked Deir Yassin.Deir Yassin was a village with about 750 Palestinian residents. The village lay outside the area that the United Nations recommended be included in the future Jewish State. It had a peaceful reputation and had even driven out some Arab militants. It actually had a peace pact with Givat Shaul, the head of the Arab division of the Haganah intelligence. But it was located in a corridor between Tel Aviv and Jerusalem and some groups wanted it destroyed so it could become a small airfield.The attack went poorly, because, as Haganah intelligence reported, the two dissident groups had no training, no coordination and no knowledge of how to provide cover fire or carry out leap-frog attacks in which squads provide each other with cover in turn.Map show ing Deir Yassin in relation to Jerusalem i...However, by noon over 100 people, half of them women and children had been systematically murdered. Four commandos died at the hands of resisting Palestinians using old Mausers and muskets. Twenty-five male villagers were loaded into trucks, paraded through the Zakhron Yosef quarter in Jerusalem, and then taken to a stone quarry along the road between Givat Shaul and Deir Yassin and shot to death. The remaining residents were driven to Arab East Jerusalem.There was a final body count of 254 was reported by the New York Times, but the number was disputed and is said to be anywhere from 120-254.People often ask what was the Stern and Irgun's purpose for massacring a whole village was, and it is considered by some that they mainly wanted...

Tuesday, November 5, 2019

6 Functions of Behavior and How to Identifying Them

6 Functions of Behavior and How to Identifying Them Behavior is what humans do, and its observable and measurable. Whether it is to walk from one place to another or to crack ones knuckles, behavior serves some type of function. In the research-based approach to modifying behavior, called  Applied Behavior Analysis, the function  of an inappropriate behavior is sought out, in  order to find a replacement behavior to substitute it. Every behavior serves a function and provides  a consequence or  reinforcement  for the behavior. Spotting the Function of a Behavior When one successfully identifies the function of the behavior, one can reinforce an alternate, acceptable behavior that will replace it. When a student has a particular need or function fulfilled by an alternate means, the mal-adaptive or unacceptable behavior is less likely to reappear. For example, if a child needs attention, and one gives them attention in an appropriate way because of appropriate behavior, humans tend to cement the appropriate behavior and make the inappropriate or unwanted behavior less likely to appear. The Six Most Common Functions for Behaviors To obtain a preferred item or activity.Escape or avoidance. The behavior helps the child to escape from a setting or activity that he or she doesnt want.To get attention, either from significant adults or peers.To communicate. This is especially true with children with disabilities that limit their ability to communicate.Self-stimulation, when the behavior itself provides reinforcement.Control or power. Some students feel particularly powerless and a problematic behavior may give them a sense of power or control. Identifying the Function ABA uses a simple acronym, while  ABC  (Antecedent-Behavior-Consequence) defines the three pivotal parts of behavior. The definitions are as follows: Antecedent:  The environment in which the behavior occurs and the circumstances that surround the occurrence of the behavior or people in the environment when the behavior occurs.Behavior: The behavior, what the student actually does, that needs to be defined.Consequence:  Everything that happens after the behavior, including how people respond to the behavior and what happens to the rest of the students educational program. The clearest evidence of how a behavior functions for a child is seen in the antecedent (A) and the consequence (C.) The Antecedent In the antecedent,  everything happens immediately before the behavior occurs. It is sometimes also referred to as the setting event, but a setting event may be part of the antecedent and not the whole. The teacher or ABA practitioner needs to ask if something is in the environment that may lead to the behavior, such as escaping loud noises, a person who always presents a demand or a change in routine that might seem frightening to a child. There also may be something that happens in that environment that seems to have a causal relationship, like the entrance of a pretty girl which can draw attention. The Consequence In ABA, the term consequence has a very specific meaning, which at the same time is broader than the use of consequence, as it usually is, to mean punishment. The consequence is what happens as the result of the behavior. That consequence is usually the reward or reinforcement for the behavior. Consider consequences like the child being removed from the room or the teacher backing off and giving the child something easier or fun to do. Another consequence may include the teacher getting really angry and starting to scream. It is usually in how the consequence interacts with the antecedent that one can find the function of the behavior.   Examples of the Pivotal Parts of Behavior Example 1: Jeremy has been taking his clothes off in the classroom. During a structured observation, the therapist noticed that when the time for art approaches, Jeremy gets really agitated. When the teacher announces, Time to clean up to go to art, Jeremy will throw himself on the floor and start pulling his shirt off. It has now gotten to the point where he quickly pulls his socks and pants off, as well, so the office will call his mother to take him home. The function here is to  escape. Jeremy doesnt have to go to art class. The teachers need to figure out what it is that Jeremy wants to escape from art. The teacher may start taking his favorite toy to art and not putting any demands on him, or he/she may want to put headsets on Jeremy (the room may be too loud, or the teachers voice may be too high pitched.) Example 2: The moment that Hilary is given a demand after group, she begins to tantrum. She clears her desk with a sweep, knocks it over, and throws herself to the floor. Recently she has added biting. It has taken as much as a half hour to calm her down, but after attacking the other students, the principal has been sending her home with Mom, who she has to herself for the rest of the day. This is another function of escape, though because of the consequence, one might say it is also indirectly attention since she gets the undivided attention of Mom when she gets home. The teacher needs to work on slowly shaping the academic behavior, giving her preferred activities at her desk, and making sure there is a home note that helps Mom give Hilary extra attention, away from her typical siblings, when she has a great day. Example 3: Carlos is a  seventh grader with low functioning autism. He has been hitting girls when he goes to lunch or gym, though not hard. They are affectionately referred to as love pats. He occasionally hits a boy with long hair, but his focus is usually girls. He usually grins after he has done it. Here, the function is attention. Carlos is an adolescent boy, and he wants the attention of pretty girls. He needs to learn to greet girls appropriately to get their attention.

Sunday, November 3, 2019

Difficulties in Basic Non-Syntactic Cognitive Processes Essay

Difficulties in Basic Non-Syntactic Cognitive Processes - Essay Example According to this theory, language acquisition must occur early in life if native-like mastery is to be achieved. After the critical period has passed, the age of acquisition is no longer supposed to have an effect, and native-like performance is no longer achievable. (Birdsong, 2005) Not all L2 data conform to a strict interpretation of Critical Period Hypothesis. The age at which L2 grammatical performance begins to differ from native speakers varies widely from early childhood to late adolescence, depending on the combinations of first and second languages. ( Bialystok and Miller, 199; Mc DONALD, 2000) Recent research has also studied the grammatical performance of native speakers under memory load. Using a grammaticality judgment task, Blackwell and Bates (1995) found native speakers were impaired in their judgment ability on sentences containing agreement violations with a low concurrent memory load and showed impairment on sentences containing omissions and word order errors at a much higher memory load. The compressed speech did not affect the interpretation of active and subject-cleft structures, which follow the normal subject-verb-object word order, but it did impact the interpretation of passives and object-clefts which have non-canonical word order. A.U. Knightly, Jun, and Oh (2002) found that early passive exposure to a language spoken in the home allowed people who then learned the language in adulthood to perform well in this language on phonological measures, but did not help with syntactic mastery. The age of acquisition at which L2 learners are significantly worse than native speakers is earlier if the L1 and L2 are dissimilar than if they have more similarity. (Johnson and Newport, 189 found this age to be 7 for Chinese/English and Korean speakers.)