Monday, September 30, 2019

Control Key and Word

1. Word flags the potential error in the document window with a colored underline. A ____ wavy underline means the flagged text is not in Word's dictionary (because it is a proper name or misspelled). A)red B) blue C) yellow D) green 2. With a ____, you can convert a printed picture, drawing, or diagram to a digital file. A)fax machine B) copy machine C) scanner D) digital camera 3. The process of developing a document that communicates specific information requires careful analysis and planning. As a starting point, ____.A)analyze the intended readers of the document and their unique needs B)determine the document design and style C)establish why the document is needed D)gather information about the topic4. Character formatting is the process of changing the way characters appear ____. A)on the screen B) in print C) both a. and b D) neither a. nor b5. To see a complete list of automatically corrected words, click ____ on the Ribbon to open the Backstage view, click Options in the Backstage view, click Proofing in the left pane, click the AutoCorrect Options button, and then scroll through the list near the bottom of the dialog box.A)Home B) Format C) File D) Edit6. If the Picture Tools Format tab is no longer displayed on the Ribbon, ____ the picture to display the Picture Tools Format tab. A)triple-click B) ouble-click C) right-click D) single-click7. If yo u want to conserve ink or toner, you can instruct Word to print draft quality documents by clicking ____ on the Ribbon to open the Backstage view. A)Format B) Edit C) Insert D) File8. You want the headline to be ____, that is, positioned horizontally between the left and right margins on the page.A)left-aligned B) centered C) justified D) right-aligned9. A(n) ____ mark, sometimes called a nonprinting character, is a character that Word displays on the screen but is not visible on a printed document. A)unified B) text C) formatting D) editing10. Paragraph ____ is the process of changing the appearance of a paragraph. A)formatting B) controlling C) enhancing D) editing11. A ____ is a computer program that can damage files and programs on your computer. A)virus B) cold C) bug D) flu12. In Word, the default font usually is ____.A)Times New Roman B) Arial C) Cambria D) Calibri13. ____ text prints with an underscore (_) below each character. A)Italicized B) Underlined C) Embossed D) Bolde d14. To save an existing document with the same file name using one click, press the ____ button on the Quick Access Toolbar to overwrite the previously saved file. A)Save B) Save As C) either a. or b. D) neither a. nor b.15. When you ____ text, Word colors the rectangular area behind any text or graphics. A)border B) emboss C) bold D) shade16. ___ properties are associated with all Microsoft Office documents and include author, title, and subject. A)Basic B) Trusted C) Default D) Standard17. The ____ is the first line of text on a document. A)header B) footer C) headline D) body copy18. A ____ is a word or phrase that further describes the document. A)keyword B) tab C) property D) characteristic19. Each time you press the ____ key, Word creates a new paragraph and inserts blank space between the two paragraphs. A)F3 B) ENTER C) TAB D) CTRL20. ____ denotes success, victory, creativity, and enthusiasm. A)Red B) Blue C) Orange D) Purple21. You can center page contents vertically betwe en the top and bottom margins. To do this, click the Page Setup Dialog Box Launcher, click the ____ tab, click the Vertical alignment box arrow, click Center in the list, and then click the OK button. A)Alignment B) Format C) Layout D) Edit22. The ____ consists of all text between the headline and the signature line. A)placeholder B) header C) footer D) body copy23. Word flags the potential error in the document window with a colored wavy underline. A ____ wavy underline indicates the text may contain a contextual spelling error such as the misuse of homophones (words that are pronounced the same but that have different spellings or meanings, such as one and won). A)yellow B) red C) blue D) green24. Word flags the potential error in the document window with a colored wavy underline. A ________wavy underline indicates the text may be incorrect grammatically. A)red B) yellow C) green D) blue25.A single point is about 1/72 of one inch in height. A)1/18 B) 1/9 C) 1/72 D) 1/3626. The MLA style requires that you set the line spacing to ____ for the entire research paper. A)double B) multiple C) 1. 5 D) single27. Word automatically inserts page breaks, called _____, when it determines the text has filled one page according to paper size, margin settings, line spacing, and other settings. A)hard page breaks B) anchored page breaks C) floating page breaks D) soft page breaks28. A ____ is text and graphics you want printed at the top of each page in a document.A)title B) superscript C) header D) footer29. Word automatically numbers notes sequentially by placing a ____ both in the body of the document and to the left of the note text. A)note reference B) footnote C) reference point D) tag30. A(n) ____ is text and graphics that print at the bottom of every page. A)anchor B) end note C) footer D) footnote31. To find a word with a similar meaning to the one already in your document, right-click the word and select ____. A)Other Words B) Dictionary C) Synonyms D) Find new32. A(n) _____ page break is one that you force into a document at a specific location. A)automatic B) manual C) forced D) soft33. If rulers are not displayed, click the ____ button on the vertical scroll bar to display them. A)Normal B) Measure C) View Ruler D) View34. To create a hanging indent using shortcut keys, press ____. A)CTRL+T B) CTRL+R C) CTRL+M D) CTRL+235. If you do not want to keep a change made by the AutoCorrect feature, you can click the ____ button on the Quick Access Toolbar.A)Disable B) No C) Undo D) AutoCorrect Off36. The ____ page alphabetically lists sources that are directly referenced in the paper. A)works cited B) citations C) note reference marks D) endnotes37. A ____ is a named group of formatting characteristics. A)style B) pattern C) header D) format38. Use a ____ to signal that an explanatory note exists. A)footnote B) header C) subscript D) superscript39. The ____ feature in Word automatically corrects certain spelling, typing, capitalization, or gramma r errors.A)AutoMark B) AutoSpell C) AutoCorrect D) AutoFix40. The MLA documentation style uses ____ instead of noting each source at the bottom of the page or at the end of the paper. A)parenthetical references B) works cited C) endnotes D) footnotes41. A(n) ____ is text that you want printed at the bottom of the page. A)footer B) header C) footnote D) endnote42. The amount of vertical space between lines of text in a document is called ____. A)double-space B) vertical spacing C) line spacing D) single space43.To capitalize all selected characters, press ____. A)CTRL+SHIFT+A B) SHIFT+A C) CTRL+ALT+A D) CTRL+A44. The shortcut keys for formatting a paragraph with single spacing is ____. A)CTRL+ALT+S B) CTRL+1 C) ALT+S D) CTRL+S45. If you are using the APA style, you should double-space all pages of the paper with ____ top, bottom, left and right margins. A)2 inch B) 1. 5 inch C) . 5 inch D) 1 inch46. The _____ is a temporary Windows storage area. A)Copyboard B) Clipboard C) Editing fo lder D) Copy and Paste pane47.If you click the ____ button, a menu appears that allows you to change the format of the item that was moved. A)Paste Options B) Format Paste C) CTRL key D) Clipboard48. To use ____, you double-click a blank area of the document window, and Word automatically formats the item you enter according to the location where you double-clicked. A)AutoFormat B) Click and Type C) Cut and Paste D) Show/Hide49. To add a word to the custom dictionary, right-click the flagged word, and then click ____ on the shortcut menu. A)Add Custom B) Insert C) Edit Dictionary D) Add to Dictionary50.The MLA style specifies that a(n) ____ be used for a note reference mark to signal that an explanatory note exists at the end of the document as an endnote. A)footnote B) footer C) superscript D) subscript51. At the top you see Version ___. A)A B) B C) C D) DAnswer Key   1. A2. C3. C4. C5. C6. B7. D8. B9. C10. A11. A12. D13. B14. A15. D16. D17. C18. A19. B20. C21. C22. D23. C24. C25 . C26. A27. D28. C29. A30. C31. C32. B33. C34. A35. C36. A37. A38. D39. C40. A41. A42. C43. A44. B45. D46. B47. A48. B49. D50. C

Sunday, September 29, 2019

Difference Between Subjective and Objective Forms of Appraisal

Difference between subjective and objective forms of appraisal Subjective appraisal is of where the appraisal is evaluated on the feelings of the evaluator. This isn’t judged on criteria as the objective appraisal is judged on set criteria and has no basis on how the evaluator feels about the performance, just how he views each select sector. Explain the process of creating movement. There are many steps that are relevant to the sport of rugby league in creating movement.There are many elements that influence and create the process of movement; these include coaches, improvising, motivating factors, rules and variations. Coaches play a large amount in the structure of a team, so therefore they play are large part in the what movement is done by the individual players. Often the coaches and administrators will practice what movements they want their chargers to do. Improvising is an integral part of movement in rugby league as the dynamics of the general play is always changing and often you cannot stick to a set play that is practiced.This is because you have direct opposition and it is unpredictable of what they are going to do. Motivating factors are another major factor in the process of movement. Often this is directly related to the score of the game. A good example is in rugby league upon a field goal is a great idea at equal scores with a minute left. The main motivating factor of sport is to win and therefore all movements are drawn on accordingly. Rules govern how the game is played and have an immense impact on the decisions made by the players and coaches and what movements are done.In rugby league, it is well known to go for the legs or the midriff in a tackle so you don’t slip and go around the head which results in a penalty. Variations are small differences in plays, this is normally attributed to the opposition understand what you are trying to, and varying to get a different outcome. These can often include different and more diff icult changes to the basic skills, like look away passing. These elements of rugby league and many others create a basis of which movement is created in game.The elements not only affect movement but are an integral part of the process and the creation of movement. Each sport is different and has different examples of what elements affect the process of movement. Using a movement medium of your choice critically analyse how each of the elements of composition can be applied to the activity when comprising and performing Combining and arranging movement so that it is fluent and unpredictable to the defence. This is the main component of creating successful movement in the sport of Rugby League.Some of the things that effect composing and performing in rugby league include the space, dynamics, time and rhythm and relationships. Space plays a big part in the game of Rugby League. Playmakers in the game are always trying to exploit space to use it to the team’s advantage to score points. This use of space is personsified no better than with the kick and chase. This uses the space behind the defensive line and uses a small chip kick over the line with the player chasing through the line to attempt to catch the ball and make a run to the tryline.This type of play utilizes the space that is often not thought about and can often make a large difference to the mindset of the opposing players. Patterns and Formations play a large key in the sport of Rugby League. A lot of the the attacking and defensive plays are practiced rigiously and in detail at training. They are used to correct any possible faults that would usually occur during a defensive position that was unplanned. A usual formation that occurs in defence is the fullback staying behind the play in case of a line break through the defensive line.Also having the wing players drop back to align with the fullback on the 5th tackle is another ploy to stop the effectiveness of an attacking kick that attempts to gain field position. Dynamics is an important part of rugby league, most notably in defence when force and flow can create a strong tackle to stop the attacking player. This can often change the feeling of the game and the team morale, as well as the momentum of the general play that is current. Force can also help you break tackles as the defenders arms cannot react to the physical contact they receive in the tackle.Flow is the degree of control of movement through time and space. This is imperative in the success of an attacking team as having bound flow usually presents a positive effect in a rugby league team. Timing and rhythm is imperative in the game of rugby league. Many aspect of this are more important than other, momentum is crucial as an attacking player, as the defensive player rarely has more momentum, the attacking player often needs to use this to his advantage. Timing of the run and timing of the pass is also important for a play to work successfully.If the timin g of either the runner or the passer is out of the zone then often the pass will be unsuccessful and the play will break down due to either a failed pass or a failed catch. Timing is something that is picked up to almost a telepathic event after much time spent as partners or teammates, a lot also derives from direct communication. Relationships are a huge key to a positive performance in a rugby league game. Having positive relationships with your fellow teammates can have them help you to be in position and create a movement they need for what they are trying to achieve.This can stem back to team formations and positional play. Often knowing your teammates positive attributes and their strengths can result in better movements suited to them and their style. In conclusion, these elements of composition can easily be applied to the sport of Rugby League in many different ways. All of the elements are important and can have a profound effect on the overall performance and the result of the game. The positive use of all elements of compositions can maximise the potential of the performance and all of the possible results that can occur.

Saturday, September 28, 2019

Military and Technology Essay Example | Topics and Well Written Essays - 1500 words

Military and Technology - Essay Example Politics is another major factor that determines the acceptance of a certain technology. Military technology is associated with various engineering fields like the mechanical, chemical, mechatronics etc. And the use of this technology requires basic military training as result; some of these harmful gadgets are not left to the civilians like the bombs, guns, missiles etc. However, some technologies were meant for the militants but with time and advancements the government allowed the civilians to be in their possessions (General Books LLC, 2010). My work focuses on the global positioning system (GPS) technology. GPS is space technology that helps in locating objects directed by the satellites. It also indicates the surrounding weather. A GPS receiver is the gadget that uses the space technology to give locations among other benefits. The signals received by the GPS receiver from the satellite is analyzed accompanied by some calculations then the receiver gives feed back in terms of t he transmit time and the distance to the satellite all displayed on the receivers’ screens hence can be used by the militants to locate positions. This technology was developed in 1973 to solve the problems associated with navigation. Man had a problem with locating places and this made navigation-a very important aspect in the military so difficult. Before this invention, man tried to solve the positioning and navigation problems by using the stars which were not reliable as they only existed during some nights. The star pattern kept changing, giving wrong information in terms of positioning. Pendulums on the other hand were used to indicate time and they were not only slow but also cumbersome to carry and count the swings. It was also not accurate hence could not be relied on. Design and the principles behind this space technology were not original but were adopted from some radio based systems of navigations that include the Loran as well as the Decca technology which were found in 1940. Atomic clocks used the gravitational forces to indicate time and this solved part of navigation problems however, it gave vague information to the militants as it only showed time but not positioning hence some innovations were still required. Another prior related innovation was the omega system of navigation and it also had several limitations as it was not accurate. The greatest need that led GPS technology innovation was during the cold war ant the United States wanted to use the nuclear bombs for attack. The submarines were to be accurately positioned before releasing their missiles. The air force had to navigate accurately to get the correct positions to release their missiles. The weight and urgency of these needs led to innovation of GPS but the first technology was in adequate as it’s slow to the fast moving air force planes. The technology was advanced to assist in timing too and by around 1974 it had atomic clock. A better product was attained by in corporating the ideas of navigation, and timing hence a better GPS. This was further advanced to Navistar GPS. The invention was based on scientific knowledge i.e. the effect of time in a strong electromagnetic region. It was found that time is slowed and this could be used to indicate time as well as navigation. However, the experiments were based on trial and error method and this cost the government a lot of cash until some positive feedback was attained. The combination of timing and the navigation component was basically on trial

Friday, September 27, 2019

Business data analysis Essay Example | Topics and Well Written Essays - 1750 words

Business data analysis - Essay Example Additionally they have decided to analyse the operating cost of the copier machines compared to various alternatives as well as phone call data for sales reps and the sales report for active customers over the past year. Laurel plans to use these records to provide management with information that can assist in some way in the decision making process. Introduction This paper represents an analysis of the operations of HH Industries. The company has employed an analyst to provide information that will help the company to make decisions. This information has to be presented to management in such a way that they can understand and so will make informed decisions regarding the way forward. 1.1 Frequency Distribution Tables and Histograms for Quarter 1 and 2 Laurel has prepared frequency distribution tables and histograms for quarter 1 and quarter 2 of 1991. These can be found in Appendix 1. The table and chart for Quarter 1 1991 shows the frequency of the average daily order size for Jan uary to March 1991. The information in the table and chart indicates that orders valued between $120 and $140 occurred most frequently for a total of 19 days for the quarter. This was followed by orders ranging from $100 to $120 (17 days), $140 to $160 (10 days) and $80 to $100 (8 days) respectively. The data in Appendix 1 (a) also shows the frequency distribution and histogram for quarter 2 of 1991. The Table and histogram provides information on the frequencies of the average daily order size for April to June 1991. It shows that orders valued from $100 to $120 occurred most frequently – 24 days for the quarter. This was followed by orders ranging from $120 to $140 (19 days), $80 to $100 (10 days) and $140 to $160 (6 days) respectively. 1.2 Frequency Distribution and Histogram of Total Daily Orders for all Four Quarters The frequency distribution and histogram of the total daily orders for Quarter 3 of 1990 which are shown in Appendix 1 (b) indicates that daily orders of 15 0 to 160 occurred most frequently at 16 days during the quarter. This was followed by daily orders of 140 to 150 which occurred 14 times for the quarter, 160 to 170 which occurred 13 days for the quarter and 170 to 180 which occurred for a total of 10 days during the quarter. The frequency distribution and histogram of the total daily orders for Quarter 4 of 1990 indicates that daily orders of 160 to 170 occurred most frequently at 15 days during the period. This was followed by daily orders of 150 to 160 which occurred 10 days for the period, 170 to 180 which occurred 9 days for the quarter, and 180 to 190 and 190 to 200 which occurred for a total of 8 days each during the quarter. The frequency distribution and histogram of the total daily orders for Quarter 1 of 1991 indicates that daily orders of 170 to 180 occurred most frequently at 14 days during the period. This was followed by daily orders of 160 to 170 which occurred 12 times for the period,

Thursday, September 26, 2019

Desert of the Skeletons (full documentary) Essay

Desert of the Skeletons (full documentary) - Essay Example Women cover their body with thick reddish cream and wash their hair with ash. People bath only once in their lives before getting married; this fact is disappointing from the western point of view because people care about high hygiene standards. The Himba live in small huts made of clay, branches and other available materials. They move across the desert according to the season in order to get enough water for their cattle to survive. All in all, this movie reveals the fact that not all people accept the changes of the world. Bushmen and the Himba prefer to hide from the rest of the world and follow their traditional way of life. The influences of globalization are obvious even in their tribes; some of hunters wear snickers. The survival skills of these people are amazing; they know all edible plants and animal species in their area. Their respect to their tradition is very relevant for other people to understand how people lived before the civilization. This movie inspires to read more about indigenous peoples to understand their customs at least a little better. Also, Bushmen people can teach other nations how to live in harmony with their

Wednesday, September 25, 2019

Ace records Essay Example | Topics and Well Written Essays - 250 words

Ace records - Essay Example duties in your new stations, you will be allocated a sum of three hundred dollars to enable you buy some of the things that you may find necessary for your operations. With this money, you can buy items such as personal clocks, carpets to make the office welcome and some source of entertainment like a radio to keep you company. The organization through this transformation, will intrinsically make us comfortable while we carry out our duties. This new environment will also allow for privacy given that everyone will operate in his or her own office. Extrinsically, the firm will attract more customers which will generate more income. I know some obstacles such as competition from other well-doing companies will arise but we shall put so much effort as possible. Competition is necessary in a company because it develops hard work in all business firms (Silverstein, 2007). I wish you all the best in your undertakings hoping that you will now dedicate yourselves to make this record group become one of the best in this region and beyond. All of us will be glad when in the next few years, we relocate to a much better and bigger station to make our performance even

Tuesday, September 24, 2019

Study of protocols in a VoIP network Essay Example | Topics and Well Written Essays - 4000 words

Study of protocols in a VoIP network - Essay Example These applications later came out with voice conversation features in which users utilize computer headsets or IP telephone handsets in communicating with one another. Services like call forwarding, conference calling, voicemail, contact management and directory assistance were later added and paved the way for the creation of a new revolutionary technology - Voice over Internet Protocol or VoIP. This development has captured the attention of telecom regulators and operators who have now started to embrace the technology as one of their mainstream services. The two most popular protocols, H.323 and SIP will be discussed in this report. H.323 is a standard for the transmission of real-time audio, video, and data information over IP-based networks. The standard contains specifications on the components, protocols, and procedures required in providing multimedia communication over local-area networks (LANs), metropolitan-area networks (MANs), wide-area networks (WANs) and even enterprise networks (ENs). Applications of H.323 may include IP telephony (audio only), videotelephony (audio and video), audio+ data and audio+video+data. H.323 can also be used for point-to-point or point-to-multipoint-multimedia communications like videoconferencing. Based on these applications, it can be seen that the standard can be utilized in a wide market segment - from consumer to enterprise to telco services. The H.3 Versions The H.323 standard is specified by the ITU-T Study Group 16. Version 1 was formulated in 1996 and refers to visual telephone systems and equipment for LANs that provide a nonguaranteed quality of service (QoS). It is geared more for consumer applications via LANs and the Internet. Version 2 of the standard was formulated in 1998 to accommodate the introduction of new voice-over-IP (VoIP) applications and IP telephony. The absence of a governing standard for these applications resulted to incompatibility of PC-based equipment and PBX or PSTN-based peripherals, so the new H.323 version was defined. At present, there are moves to add new specifications to the standard for new applications like fax-over-IP networks, gatekeeper-to-gatekeeper communications, and fast-connection mechanisms. This will pave the way for Version 3 of the standard. Components The H.323 standard specifies four kinds of components: 1. Terminals. An H.323 terminal can either be a personal computer (PC) or a stand-alone device, running the multimedia applications. It primarily supports audio communications but can optionally support video or data communications. The primary goal of H.323 is to interface standard-defined equipment with other multimedia terminals. 2. Gateways. A gateway refers to the equipment used to provide connectivity between an H.323 network and a non-H.323 network. The H.323 network can consist of PCs and PC-based peripherals while a non-H.323 network can refer to a PBX or PSTN network. In order to achieve connectivity between these two dissimilar networks, translating protocols were developed for traditional telephony features like call setup and release. It should be noted that a gateway is not required for communication between two H.323 terminals within an H.323 network. 3. Gatekeepers. A gatekeeper is necessary if an H.323 network will be implemented with services such as billing, addressing, call-routing, bandwidth management and authorization and

Monday, September 23, 2019

Mitigation Strategies and Solutions Essay Example | Topics and Well Written Essays - 1750 words - 1

Mitigation Strategies and Solutions - Essay Example Today’s research proves that the Earths average surface temperature has risen by about 1Â °F in 20th century. Meteorologists have firm logics and facts that the Earth’s warming is highly associated to human activities as it has been increasing since the onset of industrial revolution in 1950. Human beings have changed the chemical composition of the atmosphere by producing greenhouse gases mainly carbon dioxide, methane, and nitrous oxide. These are heat-trapping gases. In the Earth’s atmosphere, greenhouse gases are those that first absorb solar radiation and then release it to the atmosphere within the thermal infrared range. This process is called the green house effect which is the fundamental cause of global warming. The well known greenhouse gases in the Earth’s atmosphere that play a major role in global warming are carbon dioxide, nitrous oxide, methane, water vapor, and ozone. Hydro-fluorocarbons, per-fluorocarbons and sulfur hexafluoride are som e other very dominant greenhouse gases that are the results of variety of industrialized processes. Major human actions such as use of fossil petroleum, automobiles, emerging industrial and urban areas, electric power plants and clearing of land are primarily responsible for the increased concentration of carbon dioxide whereas deforestation is the basic cause of enhanced concentration of carbon dioxide, methane and nitrous oxide. The perspective of cooling influences and facts about global warming have proved a very high confidence level of 90% that the globally net effect of warming is due to human activities since 1750 (IPCC, Third Assessment Report, 2007). The contribution of these gases to the greenhouse effect is given in the following table. Some of scientists which are not in majority disagree about the association of increased greenhouse gases to the human activities. They claim that the global warming is the result of natural

Sunday, September 22, 2019

Management Accounting Essay Example | Topics and Well Written Essays - 1500 words

Management Accounting - Essay Example You should refer in your answer to parts (a) and (b) of the question which should be included in the appendices to the report. In the absorption costing system, all the three products seem to have made a substantial profit (BALAKRISHNAN, SIVARAMAKRISHNAN, & SPRINKLE, 2008, pp56-67). The key issue with absorption costing systems is with timing; fixed manufacturing overhead costs are charged against revenue when units are sold. As seen in (a) above, all manufacturing  overhead costs are included in the  calculation of product unit cost. This forms the basis of the costing system in absorption costing. All of a product’s  manufacturing costs, both variable and fixed,  are said to be ‘absorbed’ by the product. Under absorption costing, a certain amount of  fixed manufacturing overhead cost is applied to each unit of output. As with the case in (a) above, under absorption costing unit manufacturing cost  included direct material, direct labour, applied  v ariable manufacturing overhead and applied  fixed manufacturing overhead. Consequently, when each of the  units is sold the fixed overhead cost per unit is  included in the expense ‘Cost of goods sold’ as shown in the tables above (BALAKRISHNAN, SIVARAMAKRISHNAN, & SPRINKLE, 2008, pp56-67). Therefore, apportioning overheads using absorption costing is profitable for all the three products. On the other hand, we can include only the  variable manufacturing costs in product unit cost  and to treat fixed manufacturing overhead as  a period cost i.e. as an expense on the income  statement as the case in (b) above. This system is known as variable  costing also known as direct costing. We will  now examine affects profit determination (BHATTACHARYYA, 2011, pp45-100). Fixed manufacturing cost is not treated as a product costs under variable costing. Rather, fixed manufacturing cost is treated as a period cost and, like selling and administrative expenses, it is charged off in its entirety against revenue each period. Consequently the cost of a unit of product in inventory or cost of goods sold under this method does not contain any fixed overhead cost (LUCEY, 2003, pp78-89). Under variable costing, all variable costs of production are included in product costs. Thus if the company sells Baltic at 217.25 unit of product, only 217.25 will be deducted as cost of goods sold, and unsold units are carried in the balance sheet inventory account at only 217.25. This realizes a loss of 75.13. This is a result of excluding fixed production costs when costing yet they are part of the total production costs. With variable costing, the total amount of fixed manufacturing overhead cost is  expensed in the current accounting period, irrespective of how many

Saturday, September 21, 2019

The Gothic form of writing Essay Example for Free

The Gothic form of writing Essay The Gothic form of writing is generally held to have started in the Eighteenth century with the publication of Castle of Otranto by Horace Walpole. This form of writing developed over the next two centuries, utilising the realms of the supernatural and the fantastic, while creating an atmosphere of gloom and decay. Edgar Allan Poe was the founder of the modern detective story and one of the greatest exponents of the Gothic novel. His Tales of the Grotesque and Arabesque published in 1840, included perhaps the epitome of the Gothic genre, The Fall of the House of Usher. In order to assess whether the passage given is typical of the Gothic and detective novel, it is necessary to examine both The Fall of the House of Usher and The Murder in the Rue Morgue. The Gothic novel exists both in a dark and unreal world and a world of normality, encouraging a co-existence between the natural and the unnatural. As the story of The Fall of the House of Usher unfolds, the mood and tone of the novel are enhanced by the bleak, isolated and ominous description of the house and its surroundings. This conveys to the reader the sensation that a mystery is about to take place, while also allowing one to become mindful of the pervasive feeling of trepidation and suspense. As the narrator draws nearer to the gloomy and forbidding home of the Ushers, he is unnerved by the house and its surroundings. He tries to allay these fears by maintaining that the unnatural and portentous aura that the house and its environs possess, are (III: pg 138) caused by natural phenomena. Gothic writers were concerned with the mind, the causation of madness and the borderline nature of sanity and insanity. J. Porte states that Edgar Allan Poe designs his tales as to show his narrators limited comprehension of their own problems and states of mind. (IV: pg 160). The narrator in the story seems to be the epitome of rationality and has no desire to loose his sanity. The world he is a part of is the world of common sense and pragmatism, (IV: pg 163), but this world is traumatised by the sensations he feels towards the House of Usher and its surroundings as he approaches it, and he can not grapple with the shadowy fancies that crowded upon him.(III: pg 138). He therefore acknowledges in true Gothic style that the supernatural effect created by the house has an impact on ones unconscious, creating a capacity for sorrowful impression. Although this notion may be forthcoming from a first impression, such impressions can be incorrect. The narrator believes however, that it is the mind that dictates ones feelings and senses, (III: pg. 138) and concludes that any investigation of the manipulative powers of these effects over the mind is beyond our depth.(III: pg. 139) This he feels is a a mystery all insoluble and states that if the house and its surroundings did not look so depressing and did not cause him to suffer a sense of insufferable gloom(III: pg 138), then this feeling of forbidding would not be so transparent in his mind. The Murders in the Rue Morgue deals with the seemingly mysterious and puzzling murders of two women in their apartment. The complexity and unusual circumstances of their deaths leaves the police completely baffled by the case and someone of supposedly superior intellect and mental acumen is needed to solve the murders. Dupin the detective and his companion the narrator, use analysis to solve the case. There are no shadowy fancies(III: pg 138), as in The Fall of the House of Usher, everything is calculated and logical. The fundamental difference between the passage from the House of Usher and Poes detective story is that, in the former the mystery is all insoluble, while exploring the restricted subjects of incest and the mind. In the latter however, the mystery is solved and there is no exploration of anything other than logic, which suggests that the author may be conforming to society and submitting to the bourgeoisie community and therefore creating a typically American detective novel. (II: pg 497.) The eerie way in which the room is locked leaving no signs of entry or exit, and the way in which the murders are committed, leaves the reader to assume the possibility that the murders are of supernatural element. This consideration is dismissed by Dupin, who maintains that The doers of the deed were material (III: pg 209), and that he did not believe in preternatural events. (III: pg 209) This is in complete opposition to The Fall of the House of Usher, where the narrator, as he first comes into contact with the house and its surroundings, is under the impression that here is something unnatural. The descriptive way in which the passage from The Fall of the House of Usher suggests that by changing the particulars of the scene(III: pg 139), the effect that the house imposes on the narrator can be changed. This reflection is not seen by Dupin in The murders in the Rue Morgue, there is no sense of sorrowful impression. (III: pg 138). To Dupin the murders are merely peculiar (III: pg 206), he is unattached and uninvolved in the murders, apart from the excitement that they generate. Both the narrators are however, sympathetic to the plight of the victims and show compassion, but they are unable to interfere in any of the proceedings and merely retell their account of the events. In order to be considered as part of the Gothic genre the passage from The Fall of the House of Usher and the story, The Murders in the Rue Morgue, have to follow certain criteria. The dark and forbidding features which highlight the supernatural countenance of the The Fall of the House of Usher are certainly conducive to the Gothic novel. Also the perception of mystery and suspense created as the story delves into the hidden and sublime world of the subconscious, while exploring hidden agendas that supposedly should not be discussed in decent society, certainly qualify the story as belonging to the Gothic style. The Murders in the Rue Morgue, while following the same pattern of using horror, mystery and a sense of pervasive gloom does not however, seem to be able to align itself with this genre. There is no supernatural element involved. The story is recounted with rational explanation and it is logic that is used to solve the crime. This means the story is explained as it develops, rather than it developing by itself, as The Fall of the House of Usher does, thereby allowing it to remain enveloped in the Gothic shroud of mystery and suspense.

Friday, September 20, 2019

Amazon Web Services Aws Computer Science Essay

Amazon Web Services Aws Computer Science Essay Amazon Web Services is a collection of  web services that together make up a  cloud computing  platform, offered over the Internet by  Amazon.com.   AWS or Amazon Web service is a suite of products used for hosting that aims to take the trouble out of traditional hosting solutions. Dropbox , Reddit and many other services use Amazon web Service. AWS isnt just used for storage, It can also be used to host a couple of servers  on AWS and quite efficiently too. It can be used host a large scale of applications such as a backend program for an iPhone application or a large server for a banking industry. The below Image shows the services provided by Amazon Web Services The reasons why we have chosen amazon web service as opposed to its competitors are listed below. 1. Flexibility The most important feature of the Amazon Web Service is the flexibility it gives to its user. All the service hosted work and communicate together with the application to automatically judge demand and handle the work accordingly. The making use of Application Programming Interfaces (APIs) provided by Amazon and the Amazon Machine Images (AMIs) we create, we can have a solution which is completely customized and one that provisions a server instance in less than ten minutes, and is ready to accept connections once it comes online. The instances can then be quickly shut down when they are no longer needed, making server management at the easiest ever. It also provides the Auto Scaling and Load Balancing features which enhances the flexibility of Amazon Web Service. 2. Performance The AWS is the fastest among the entire service provider available. The Elastic Block Storage (EBS) is nearly as fast as S3, but provides different features. EC2 Compute Units provides Xeon-class performance to the user at an hourly rate. The reliability is better with Amazon Web service than most other private datacenters in the world, and if there is a problem in the server, youre always still online, but with reduced capacity. An example of this is the recent outage that happened in the Northern Virginia cluster of AWS, one of Amazons primary datacenter farms in the United States. It affected Reddit, WordPress.com, and several other major sites which had used Amazon Web Service. These sites were still online but in a read-only mode, as Amazon had to shut down writing to their backend storage until they could resolve the problem. In a traditional hosting environment, this probably would have meant a longer downtime and 404 errors (Page not found) as the websites would have stopped responding. But in a truly cloud-hosted environment like AWS, theres enough separation between processing and storage that sites can remain online and continue generating revenue even with reduced functionality. But the primary performance power of Amazon Web Service is in the storage. The distributed nature of Elastic Block Storage (EBS) and Amazon Simple Storage Service (S3) yields millions of inputs and output operations per second to all its instances. Imagine of it like having a raid array of Solid State Drives on a particular computer with incredible bandwidth, and you have a storage system which is capable of vast scaling, with an approximate reliability of 99.999999999%. 3. Pay for what you use Pricing The pricing policy used by Amazon Web Service is very different from most of the other service providers. Every service provided by Amazon Web Service is a la carte, meaning you pay for what you use. This makes it very useful for server infrastructure, when the traffic is very bursty, especially when the site is large. Consider a scenario when you need to develop an application to showcase it at an event for a very short duration of time. If we were to use a traditional service provider we would be tied up to a year contract but using amazon web service we pay for what we use, and also we pay for the CPU usage and not by the duration alone. This way the user does not have to worry about the performance as the AWS Auto scaling would create a new Instance and balance the load. 4. The Free Tier The free tier provided by AWS on user registration, provides enough credit for a user to run an EC2 micro instance 24/7 all month. It comes with Simple Storage Service, EC2 compute hours, Elastic Load Balancer time, and much more. This gives developers a chance to try out Amazon Web Services Application Programming Interface in the software they develop, which not only enhances their software, but also ties them to Amazon which would benefit Amazon in the long run. 5. Deployment Speed The biggest difficulty in developing an application is in during the deployment of the application. Traditional service providers take somewhere from 48-96 hours to provision a server. Then the developer needs to spend an extra few hours tweaking it and getting everything tested. Amazon Web Services shrinks that deployment time to minutes. By making use of the Amazon Machine Images, we can have a machine deployed and ready to accept connections in a very short amount of time. This is important when, for example, we are running a promotion that generates heavy traffic at certain specific intervals of time, or when flexibility is required to handle the demand when a new product is released. Competitor Comparison: Company Specification Computing Category Iaas Iaas Control Interface Web Based Application/Control Panel Web Based Application/Control Panel Application Programming Interface Application Programming Interface Command Line Graphical User Interface Guaranteed Network Availability 99.999% 100% Pricing Information Subscription Type Use Based and Subscription Plans Use Based Pricing Information http://aws.amazon.com/ec2/#pricing https://www.lunacloud.com/en/cloud-server-pricing Inbound Bandwidth Price 0 Cents 0 Cents Outbound Bandwidth Price 12 Cents per GB Used 10 Cents per GB Used Base Plan Cost $0.08 per hour $0.02 per hour Base Plan Details 1.7GB RAM, 160GB local storage, 1 EC2 Compute Unit 512 MB RAM, 1 vCPU, 10 GB DISK 2 cents/hour Features Free Support Not Available Yes but Limited Free Security Features Advanced Firewall Critical Data Privacy Custom/Secure Permissions Failover Features Advanced email/password Security Advanced Firewall Failover Features Persistency Snapshot Backup Paid Security Features Advanced Firewall Critical Data Privacy Data Encryption Intrusion Detection Persistency Snapshot Backup Backup Storage Snapshot Backup Auto scaling Yes, Free Yes, Free Load Balancing Yes, With Charge Yes, Free Monitoring Yes, Free Not Available Virtual Private Servers Yes, With a charge Yes, With a charge Root Access Yes Yes File Hosting Service Yes, With a charge Web Hosting Service No Yes, Free Compatibility Compatible Operating Systems Cent OS 5.4 Debian Fedora Gentoo Linux Open Solaris OpenSUSE Linux Red Hat Enterprise Linux SUSE Linux Oracle Enterprise Linux Ubuntu 10.04 Ubuntu Linux Windows Server 2003 Windows Server 2008 Cent OS Debian Fedora 11 Linux Operating Systems OpenSUSE Linux Red Hat 5.1 Ubuntu Linux Windows Server 2008 Processor 32 Bit and 64 Bit 64 Bit Programming Languages Supported Java PHP Python Ruby The cloud computing provider offers root access to the servers, all the programming languages are supported by the provider. WinDev The cloud computing provider offers root access to the servers, all the programming languages are supported by the provider. http://partnerweb.vmware.com/GOSIG/home.html http://www.smallnetbuilder.com/cloud/cloud-services-apps/350-5-reasons-why-amazon-web-services-takes-traditional-servers-to-school

Thursday, September 19, 2019

Charles Manson: Serial Murderer and Cult Figure :: Charlie Manson Family

Charles Manson: Serial Murderer and Cult Figure Charles Manson is known as one of the most sinister and evil criminals of all time. He organized the murders that shocked the world and his name still strikes fear into American hearts. Manson's childhood, personality, and uncanny ability to control people led to the creation of a family-like cult and ultimately to the bloody murders of numerous innocent people. Charles M. Manson was born in Cincinnati, Ohio on November 11, 1934. His mother, Kathleen Maddox, was a teenage prostitute. Manson's father walked out on the still pregnant Maddox, never to be seen again. In order to give her bastard son a name, Ms. Maddox married William Manson. He soon abandoned the both of them. Manson's mother often neglected Charles after her husband left her. She tried to put him into a foster home, but the arrangements fell through. As a last resort she sent Charles to school in Terre Haute, Indiana. Mrs. Manson failed to make the payments for the school and once again Charles was sent back to his mother's abuse. At only fourteen, Manson left his mother and rented a room for himself. He supported himself with odd jobs and petty theft. His mother turned him into the juvenile authorities, who had him sent to "Boys Town," a juvenile detention center, near Omaha, Nebraska. Charles spent a total of three days in "Boys Town" before running away. He was arrested in Peoria, Illinois for robbing a grocery store and was then sent to the Indiana Boys School in Plainfield, Indiana, where he ran away another eighteen times before he was caught and sent to the National Training School for Boys in Washington D.C. Manson never had a place to call "home" or a real family. He spent his childhood being sent from one place to another, and trouble always seemed to follow him. His mother's negligence left Manson without a home and without much of a future. Manson turned to crime to support himself, and he soon became very good at it. When just a child, he became a criminal and spent his last years of childhood in a correctional facility. After his release from the training school in 1954, a new period of Manson's life began. He went to West Virginia and soon married a girl named Rosalie Jean Willis. She became pregnant and Manson had a child. This was Manson's first real family, but he

Wednesday, September 18, 2019

Airport Planning and Organization Essay -- Logistics

Single File? According to the Federal Aviation Administration (2007), â€Å"The master planning process will vary with the size, complexity, and role of the study airport and may include a variety of supporting studies. However, all master planning studies will fall within one of two basic types: Airport Master Plans or Airport Layout Plan (ALP) Updates† (Federal Aviation Administration, 2007, p.1). This description of the master planning process is further explained by the FAA in saying, â€Å"Airport planning is a systematic process used to establish guidelines for the efficient development of airports that is consistent with local, state and national goals. A key objective of airport planning is to assure the effective use of airport resources in order to satisfy aviation demand in a financially feasible manner. Airport planning may be as broad based as the national system plan or more centrally focused as an airport master plan for a specific airport† (Federal Aviation Administ ration, 2010, p. 500-1). This explanation of how airport planning is organized may allow the reader to become more familiar with how decisions are made in regards to airport planning and organization. The basis of any airport plan or layout is set up for one primary function; to move people out as fast if not faster than they have moved in. There are a variety of ways that have been tested, failed, retested, improved, and finally established or dissolved in order to help promote this concept of moving people as easily and sufficiently as possible. Two examples that have two very different approaches to the methods of passenger flow within the airports would be to look at Detroit Metropolitan Wayne County Airport (DTW) and Washington Dulles International Airp... ...nal Airport | the Official Website of ATL Airport. Retrieved January 22, 2012, from http://www.atlanta-airport.com/Airport/ATL/ATL_FactSheet.aspx Federal Aviation Administration. (2007, May 1). Advisory circular. FAA.gov. Retrieved January 22, 2012, from http://www.faa.gov/documentLibrary/media/advisory_circular/150-5070-6B/150_5070_6b_chg1.pdf Federal Aviation Administration. (2010, October 1). Airport Planning. FAA.gov. Retrieved January 22, 2012, from http://www.faa.gov/airports/central/aip/sponsor_guide/media/0500.pdf Metropolitan Washington Airports Authority. (2012). Air Traffic Statistics. Dulles International Airport. Retrieved January 22, 2012, from http://www.mwaa.com/dulles/653.htm Wayne County Airport Authority. (2004). Aviation Statistics. MetroAirport.com. Retrieved January 22, 2012, from http://www.metroairport.com/about/AviationStatistics.asp

Tuesday, September 17, 2019

Summary Of Kidnapped :: essays research papers

Kidnapped, by Robert Louis Stevenson has a genre that classifies as historical fiction. I selected this book because the setting takes place during the 1750's, which is a perfect time for history. At that year many historic events occurred that have been written down in books today. Such as, 'The French and Indian War.'; Since the setting is in Scotland, the way the writing in the book is is quite hard.   Ã‚  Ã‚  Ã‚  Ã‚  The setting not only takes place in Scotland, but also through a voyage in a boat, as well as on islands. The year is 1751, in those days many people traveled by sea. Which is a major transportation use within this book. The setting is important to the plot, because most of the actions that ensue are either not possible today, or are unlikely to happen. For example, when David and Alan are being attacked, they must go through a system of charging their gun. That takes a long time. Today the guns are automatic; which enhances the speed of reloading by far. Today it would be extremely unlikely to see a person using the same sort of gun as they used.   Ã‚  Ã‚  Ã‚  Ã‚  David Balfour, a poor Scotsman who lived all his life in a place called Essendean. He has never been out of there. Having both his parents die was truly a tragedy. Only now has the minister of the town (Mr. Campbell, who was friends with David's father) told David that his father left him a will. The will stated, 'To the hands of Ebenezer Balfour, Esq., of Shaws, in his house of Shaws, these will e delivered by my son, David Balfour.'; David was to travel to another town, and seek a place called 'The House Of Shaws.'; David then finds out that the man living in the gruesome house (where he thought was a palace before he laid his eyes on it) was actually his uncle. His name was Ebenezer, and one of the odd things about him is that he didn't allow candles or lanterns in the house. Therefore it was hard to see at night. At first he didn't trust David at all, he would never leave him alone in the house for one second. David and Ebenezer both left to an inn near the do cks. There, David was to see a lawyer so he may get the inheritance. As for Ebenezer he had an appointment with a captain of a ship called Mr.

Monday, September 16, 2019

Chicago Referencing

Chicago Author-Date Referencing 2007 The Chicago Author-Date referencing style has two basic systems of documentation. There is the humanities style (which can also be known as the footnote and endnote or the notes and bibliography style), as well as the au- thor-date style. This guide follows the author-date system of referencing. This involves citations within the text cor- responding to a full bibliographic entry in the reference list at the end of the document. The in-text citations include the author’s last name, followed by the date of publication in parentheses.The bibliographic entry in the reference list includes all the other necessary publication information. When using EndNote, it is recommended that the style system to use is Chicago Curtin 2007. Note: this page is only an introduction to the Chicago Author-Date referencing system. Curtin University Library provides a modified version of the author-date system presented in: The Chicago manual of style. 2003. 15th ed. Chicago: The University of Chicago Press. How to cite references: Chicago style. 2006. http://wwwlib. murdoch. edu. au/find/citation/chicago. htmlIt is very important that you check your department or school's assignment guide as some details, eg. punctuation, may vary from the guidelines on this page. You may be penalised for not conforming to your school's requirements. The information and examples contained on this page are chiefly derived from the above sources. What is Referencing? Referencing is a standardised method of acknowledging sources of information and ideas that you have used in your assignment in a way that uniquely identifies their source. Direct quotations, facts and figures, as well as ideas and theories, from both published and unpublished works must be referenced.There are many acceptable forms of referencing. This information sheet provides a brief guide to the Chicago Author-Date referencing style. Within the text of the assignment the author’s name is given first, followed by the publication date. A reference list at the end of the assignment contains the full details of all the in-text citations. Why Reference? Referencing is necessary to avoid plagiarism, to verify quotations, and to enable readers to follow-up and read more fully the cited author’s arguments. Steps Involved in Referencing 1.Note down the full bibliographic details including the page number(s) from which the information is taken. In the case of a book, ‘bibliographical details’ refers to: author/editor, year of publication, title, edition, volume number, place of publication and publisher as found on the front and back of the title page. (Not all of these details will necessarily be applicable). In the case of a journal article, the details required include: author of the article, year of publication, title of the article, title of the journal, volume and issue number of the journal, and page numbers.For all electronic information, in ad dition to the above you should note the date that you accessed the information, and database name or web address (URL). 2. Insert the citation at the appropriate place within the text of the document (see examples below). 3. Provide a reference list at the end of the document (see examples below). In-Text Citations Use the name of the author, followed by the year of publication when citing references within the text of an assignment. Where authors of different references have the same family name, include the author’s initials in the in-text citation i. . (Hamilton, C. L. 1994) or C. L. Hamilton (1994). If two or more authors are cited at the same point in the text then they are included in the same in-text citation, separated by a semicolon e. g. (Brown 1991; Smith 2003). They are presented alphabetically by author. When directly quoting from another source, the relevant page number must be given and quotation marks placed around the quote. When paraphrasing or referring to an idea from another source which is a book or lengthy text, include the relevant page number, as this might be useful to the reader. How to Create a Reference ListIn general, page numbers should be included in all in-text citations, as many schools insist on this practice. A reference list only includes books, articles etc that are cited in the text. A bibliography is a list containing the sources used in developing a publication and other sources the author considers might be of use or interest to the reader. The reference list is arranged alphabetically by author. Where an item has no author it is cited by its title, and ordered in the reference list or bibliography alphabetically by the first significant word of the title. The Chicago style requires the second and subsequent lines of the reference o be indented, as shown in the examples below, to highlight the alphabetical order. 2 Examples of Referencing Books| In-Text Example| Reference List Example| EndNote X (which reference type? )| Single author| ‘The theory was first propounded in 1982’ (Horwood 1982, 65)OR‘Horwood (1982, 65) claimed that†¦Ã¢â‚¬â„¢| Horwood, J. 1982. Comfort. London: Unwin Paperbacks. | Book| 2 or 3 authors| (Madden and Hogan 1997, 22)ORMadden and Hogan (1997, 22) dis- cuss this idea†¦OR(Jones, Madding and Davis 1998, 34)| Madden, R. , and T. Hogan. 1997. The definition ofdisability in Australia: Moving towards national consistency.Canberra: Australian Institute of Health and WelfareORJones, J. , M. Madding, and B. Davis. 1998. How to ride a pony. Sydney: Australian Aquarian Press. | Book| More than 3 authors| (Leeder et al. 1996, 2)| Leeder, S. R. , A. J. Dobson, R. Gibbers, N. R. Patel, P. S. Mathews, D. A. Williams, and D. Mariot. 1996. TheAustralian film industry. Adelaide: Dominion Press. | Book| Unknown authorshipor anonymous works| (Advertising in the Western Cape1990, 74). | Advertising in the Western Cape. 1990. Cape Town: ABC Publishers. | Book | Multiple works bysame author| ‘University research (Brown 1982, 1988) has indicated that†¦Ã¢â‚¬â„¢| Brown, P. 982. Corals in the Capricorn group. Rock- hampton: Central Queensland University. Brown, P. 1988. The effects of anchor on corals. Rockhampton: Central Queensland University. Order chronologically in the reference list. | Book| 3 of 11 Multiple workspublished in the same year by the same Author| ‘In recent reports (Napier 1993a, 55)†¦Ã¢â‚¬â„¢Use a/b etc. to differentiate between works in same year. | Napier, A. 1993a. Fatal storm. Sydney: Allen & Unwin. Napier, A. 1993b. Survival at sea. Sydney: Allen & Unwin. Order alphabetically by title in the reference list. | Book| Editor| Kastenbaum 1993, 91-2)| Kastenbaum, R. , ed. 1993. Adult development. Phoe- nix: Oryx Press. | Edited Book| Different Editions| Neil Renton (2004, 75) suggests that†¦| Renton, N. 2004. Compendium of good writing. 3rd ed. Milton: John Wiley & Sons. An edition number is plac ed after the title of the work – this is not necessary for a first edition. | Book(put 3rd in Edition). | No date| (Housley [2006? ])OR(Housley n. d. )| Housley, N. [2006? ]. Contesting the crusades. Malden, MA: Blackwell. ORHousley, N. n. d. Contesting the crusades. Malden, MA: Blackwell. | Book(put [2006? ] or n. d. in Year). Encyclopedia/ Dictionary| ‘In the section on Sleepwalking in the Encyclopedia of Sleep andDreaming (Mahowald 1993, 578)’| Entries in an encyclopedia or dictionary are not listed in the reference list. | Enter the in-text citation manually. | Article or chapter in a book| As discussed by Blaxter (1976, 120-35)†¦OR(Blaxter 1976, 120-35)| Blaxter, M. 1976. Social class and health inequalities In Equalities and inequalities in health, ed. C. Carter and J. Peel, 120-35. London: Academic Press. | Book Section| Article or chapter in a book – no author| (Solving the Y2K problem 1997, 23)| Solving the Y2K problem. 997. In Technology tod ay and tomorrow, ed. D. Bowd, 23-35. New York:Van Nostrand Reinhold. | Book Section| Brochure| (Research and Training Centre 2003)| Research and Training Centre on Independent Living. 2003. Guidelines for reporting and writing about people with disabilities [Brochure]. Melbourne: Research and Training Centre. The publisher’s name may be abbreviated if it is also the author. | BookType [Brochure] manually after the Title. | E-book| (Pettinger 2002)| Pettinger, R. 2002. Global organizations. Oxford: Capstone Publishing. http://www. netlibrary. com. dbgw. lis. curtin. edu. au/ Details. spx (accessed September 28, 2004). | Electronic Book(put September 28, 2004 in Date Accessed)| Thesis| (Jones 1998, 89)| Jones, F. 1998. The mechanism of Bayer residue flocculation. PhD diss. , Curtin University ofTechnology. http://adt. curtin. edu. au/theses/ available/adt-WCU20020610. 142909/ (accessedNovember 28, 2006). | Thesis(put PhD diss. in Thesis Type)| ConferenceProceeding| (Hill 2000, 112)| Hill, R. 2000. Proceedings of the Ninth Meeting of the International National Trust, March 3-5, 2000: TheNational Trust into the new millennium. Alice Springs, NT: Australian Council of NationalTrusts. http://search. informit. om. au. dbgw. lis. curtin. edu. au/search;rec=11;action= showCompleteRec (accessed November 29, 2006). | Conference Proceeding(put 2000 in Year of Conference, The National Trust into the new millenniumin Title Proceedings of the Ninth Meeting of the International National Trust in Conference Name, March 3-5 in Date,Alice Springs, NT in ConferenceLocation, Australian Council of National Trusts in Publisher). | Annual report of an organisation| (Department of Transport and Regional Services 2001)OR(Billabong International Ltd 2005)| Department of Transport and Regional Services. 2001. Annual report 2001-02. Canberra: DTRS.ORBillabong International Ltd. 2005. Annual report 2005 – brands. http://www. connect4. com. au. dbgw. lis. curtin. edu. au/produ cts/ar/index. html (accessed November 29, 2006). | Report(put DTRS in Institution)| Image in a book| The poster ‘Buy Australian Apples’ (Cowle and Walker 2005, 65)| Cowle, C. , and D. Walker. 2005. The art of apple branding [Image]. Hobart: Apples from Oz. | BookType [Image] manually after the title. | Print Journals| In-Text Example| Reference List Example| EndNote X (which reference type? )| Article| As mentioned by Wharton (1996, 8)| Wharton, N. 1996. Health and safety in outdoor activity centres.Journal of Adventure Educationand Outdoor Leadership 12 (1): 8-23. | Journal Article| Article – no author| ‘It’s a growing problem in the UK. ’ (Anorexia nervosa 1969, 17)| Anorexia nervosa. 1969. British Medical Journal 12 (2): 6-19. | Journal ArticleYou will need to edit the in-text citation for it to appear in italics. | Newspaper, feature ormagazine article| (Towers 2000, 3)| Towers, K. 2000. Doctor not at fault: Coroner. The Australian, Januar y 18. | Newspaper Article(put January 18 in Issue Date)| Newspaper, feature ormagazine article – no author| ‘The Sydney Morning Herald (21 Jan. 2000, 12) reported†¦. | Provide all the details in the in-text citation – no need for an entry in the reference list. | | Press release| †¦. ’in the press release on 1 March,BHP enters new era, Watersmith ex- plains†¦Ã¢â‚¬ ¦Ã¢â‚¬â„¢| Treated like an unpublished document. No need for an entry in the reference list. | You will need to enter the in-text citation manually. | Electronic Journals| In-Text Example| Reference List Example| EndNote X (which reference type? )| Full text from anelectronic database| (Madden 2002, 562)| Madden, G. 2002. Internet economics andpolicy: An Australian perspective. Economic Record 78 (2): 551-78. Informit Online. http:// search. nformit. com. au. dbgw. lis. curtin. edu. au/fullText;dn=200208736;res=APAFT (accessed October 16, 2003). | Journal Article(put Informit Onlin e in Name of Database, http://search. informit. com. audbgw. lis. curtin. edu. au/fullText;dn=200208736; res=APAFT in URL, October 16, 2003 in Access Date). | Full text from anelectronic database – no author| ‘The internet has had a huge impact on the Australianeconomy’ (Internet economics and policy 2002, 350)You will need to edit the in-text citation for it to appear in italics. | Internet economics and policy: An Australian perspective. 2002. Economic Record 78 (2): 551-78. Informit Online. ttp://search. informit. com. au. dbgw. lis. curtin. edu. au/fullText;dn=200208736;res=APAFT (accessed October 16, 2003). | Journal Article(put Informit Online in Name of Database, http://search. informit. com. au. dbgw. lis. curtin. edu. au/fullTextdn=20020 8736;res=APAFT in URL, October 16, 2003 in Access Date). | 6 of 11 Full text newspaper,newswire or magazine from an electronic database – no author| (Cup lifts Seven out of ratings blues 2006, 33)| Cup lifts Seven out of ratings blues. 2006. The Australian, November 13. Factiva. http://global. factiva. com. dbgw. lis. curtin. edu. au/ha/ default. aspx (accessed November 24, 2006). Newspaper Article(put November 13 in Issue Date,Factiva in Name of Database, http:// global. factiva. com. dbgw. lis. curtin. edu. au/ ha/default. aspx in URL, November 24, 2006 in Access Date). | Full text from the Internet| It was proposed by Byrne (2004, 2) that†¦| Byrne, A. 2004. The end of history: Censorship and libraries. The Australian Library Journal 53 (2). http://www. alia. org. au/publishing/alj/53. 2/full. text/ byrne. html (accessed November 13, 2004). | Journal Article(put http://www. alia. org. au/publishing/ alj/53. 2/full. text/byrne. html in URL). | Article from Curtin E- Reserve| (Andersen 2002, 343)| Andersen, J.A. 2002. Organizational design: Two lessons to learn before re-organizing. International Journal of Organizational Theory and Behavior 5 (3/4): 343. Curtin University Li-brary E-Re serve. http://edocs. lis. curtin. edu. au/eres_display. cgi? url=DC65012621. pdf (accessed November 24, 2006). | Journal Article(put Curtin University Library E-Reserve in Name of Database, http://edocs. lis. curtin. edu. au/eres_display. cgi? url=DC650 12621. pdf in URL, November 24, 2006 in Access Date). | Article from databaseon CD-ROM (BPO)| (La Rosa 1992, 58)| La Rosa, S. M. 1992. Marketing slays the downsizing dragon.Information Today 9 (3): 58-9. UMI Business Periodicals Ondisc (accessed November 24, 2006). | Journal Article(put UMI Business Periodicals Ondisc inURL). | Secondary Sources| In-Text Example| Reference List Example| EndNote X (which reference type? )| Book| (Lewis and Carini 1984)Cite the source the quotation is from. | Lewis, E. N. , and P. V. Carini. 1984. Nurse staffing and patient classification: strategies for success. Rockville, Md: Aspens Systems Corp. Quoted inG. A. Thibodeau and K. T. Patton, eds. , The hu- man body in health and disease (St Louis, Mo. : Mosby, 2002), 77. | Enter the in-text citation manually. | of 11 Journal Article| (Ebell 2006)| Patton, K. T. Neuralgia and headaches. Science 314 (December 2006): 2153-5. Ebell, M. H. 2006. Diagnosis of migraine headache. American Family Physician 74 (Dec. ): 2087-8. Quoted in Patton 2006, 2153. | Enter the in-text citation manually. | World Wide Web| In-Text Example| Reference List Example| EndNote X (which reference type? )| Document on WWW| ‘It’s essential you learn how to reference’ (Dawson et al. 2002). | Dawson, J. , L. Smith, K. Deubert and S. Grey-Smith. 2002. ‘S’ Trek 6: Referencing, not plagiarism. http://studytrekk. lis. curtin. edu. au/ (accessed October 31, 2002). Web Page| Document on WWW –No author| (Leafy seadragons and weedy seadragons 2001)| Leafy seadragons and weedy seadragons. 2001. http://www. windspeed. net. au/~jenny/seadragons/(accessed July 14, 2001). | Web Page| Document on WWW –No date| (Royal Institute of British Architects n. d. )| Royal Institute of British Architects. n. d. Shaping the future: Careers in architecture. http://www. careersinarchitecture. net/ (accessed May 31, 2005). | Web Page(put n. d. in Year)| Image on the web| The image of the bleached coral (Coral bleaching and massbleaching events 2002)| Coral bleaching and mass bleaching events [Image]. 002. http://www. gbrmpa. gov. au/corp_site/ info_services/science/bleaching (accessed September 2, 2005). | Web Page(type [Image] manually after the title of the image)| 8 of 11 Government Publications| In-Text Example| Reference List Example| EndNote X (which reference type? )| Act of Parliament| The Commonwealth’s Copyright Act 1968†¦[future references do not include date]| Legislation is included in a list of references only if it is important to an understanding of the work. Setthe list apart from the main body of the reference under the subheading ‘Legislation'. Essential elements: Short title Date (Jur isdiction) eg.Copyright Act 1968 (Cwlth). If legislation is obtained from an electronic database, add a URL as forelectronic journal articles. | Enter in-text citation manually. | Cases| The State of New South Wales v. The Commonwealth (1915) 20 CLR54| Legal authorities are included in a list of references only if they are important to anunderstanding of the work. Set the list apart from the main body of the reference under thesubheading ‘Legal Authorities'. | Case(put 1915 in Year, The State of New South Wales v. The Commonwealth in Case Name, 20 in Reporter Volume, CLR in Reporter Abbreviation, 54 in Page Cited). Australian Bureau ofStatistics Bulletin| (Australian Bureau of Statistics 1999)| Australian Bureau of Statistics. 1999. Disability, ageing and carers: Summary of findings, Cat. no. 4430. 0. Canberra: ABS. | Report(put Cat. no. 4430. 0 in Accession Number, ABS in Institution). | Australian Bureau ofStatistics from AusStats| (Australian Bureau of Statistics 1999)| Aus tralian Bureau of Statistics. 1999. Disability, ageing and carers: Summary of findings, Cat. no. 4430. 0. Canberra: ABS. http://www. abs. gov. au/Ausstats/ [email  protected] nsf/94713ad445ff1425ca25682000192af2/e4cb97884898ec4bca2569de00221c84!OpenDocument (accessed November 20, 2002). | Report| Census Information| (Australian Bureau of Statistics 2001)| Australian Bureau of Statistics. 2001. Census ofpopulation and housing: B01 selected characteristics (First release processing) postal area 6050. http://www8. abs. gov. au/ABSNavigation/ prenav/ViewData&action=404&documentproductno=POA6050&documenttype =Details&tabname=Details&areacode=POA6050&issue=2001& producttype=Community20Profiles&&producttype= Community20Profiles&javascript=true&textversion=false&navmapdisplayed=true&breadcrumb=LPD&#Basic%20Community%20Profile (accessed November 20, 2002). | Report| of 11 Government Report| (Resource Assessment Commission 1991)| Australia. Resource Assessment Commission. 1991. Forest and t imber inquiry: Draft report. Volume 1. Canberra: Australian Government Publishing Service. | Report(put Australia. Resource Assessment Commission in Author, Forest and timber inquiry: Draft report in Title, Volume 1 in Accession Number, Australian Government Publishing Service in Institution). | Patent| (Cookson 1985)| Cookson, A. H. 1985. Particle trap for compressed gas insulated transmission systems. US Patent4,554,399, filed Nov. 28, 1985, and issued Feb. 11, 1988. | Patent(put Cookson, A.H. in Inventor, US inCountry, Patent 4,554,399 inPatent Number, Nov. 28 1985 in Date, Feb. 11 1988 in Issue Date). | Standard| (Standards Australia 1997)| Standards Australia. 1997. Size coding scheme for infants’ and children’s clothing – underwear andouterwear. AS 1182-1997. Standards Australia Online. http://www. saiglobal. com. dbgw. lis. curtin. edu. au/online/autologin. asp (accessedJanuary 10, 2006). | Report(put AS 1182-1997 in Accession Number| Other Sources| In-Te xt Example| Reference List Example| EndNote X (which reference type? )| Personalcommunication, e-mail and discussion lists with no web archive. ‘It was confirmed that an outbreak occurred in London in 1999’ (S. Savieri, pers. comm. ). | Not included in the reference list. | Enter in-text citation manually. | UnpublishedInterviews| (Campbell 2006, 2)| Campbell, B. 2006. Interview by A. Bond. Tape recording. December 1. CurtinUniversity of Technology, Perth. | Personal Communication(put Campbell, Billie in Author, Interview with Andrea Bond in Title, Tape recording in Description, December 1 in Date, Curtin University of Technology in Publisher, Perth in City). | Films and videorecordings| (Grumpy meets the orchestra 1992)| Grumpy meets the orchestra. 992. DVD. Written and directed by G. Smithson. Melbourne:Australian Broadcasting Corporation. | Film or Broadcast(put DVD in Format, Written and directed by George Smithson in Credits, Melbourne in Country, Australian Broadc asting Corporation in Distributor). | 10 of 11 Television and radioprogrammes| (What are we going to do with the money? 1997)| What are we going to do with the money? 1997. television program. Sydney: SBS Television, 8August. | Film or Broadcast(put television program in Format, Sydney in Country, SBS Television in Distributor, 8 August in Date Released). Podcasts| (The wings of a butterfly –children, teenagers and anxiety2005)| The wings of a butterfly – children, teenagers and anxiety. 2005. podcast radio program. Sydney:ABC Radio National, 10 September. http:// www. abc. net. au/podcast/default. htm#mind (accessed September 16,2005). | Film or Broadcast(put podcast radio program in Format, Sydney in Country, ABC Radio National in Distributor, 10 September in Date Released, September 16, 2005 in Access Date). | CD-ROMS| (Kingsley 1998)| Kingsley, S. 1998. Dr Brain thinking games. Torrance, California: Knowledge Adventure Inc.CD-ROM. | Computer Program(put Kingsley, S . in Programmer, Torrance, California in City, Knowledge Adventure Inc. in Publisher, CD-ROM in Type). | ERIC document (microfiche)| Davis and Lombardi (1996)put forward the proposal that†¦| Davis, R. K. & T. P. Lombardi. 1996. The quality of life of rural high school special education graduates. In Rural goals 2000: Building programs that work. microfiche. ERIC Document No. 394765. | Generic(put Rural goals 2000: Building programs that work in Secondary Title, microfiche in Type of Work, ERIC Document No. 94765 in Publisher). | E-mail discussion list– web archive| According to John Little’s post on the ECPOLICY discussion list onApril 16, 2002 (http:// www. askeric. org/Virtual_Listserv_Archives/ECPOLICY/2002/Apr_2002/Msg00003. html), it was determined that†¦Ã¢â‚¬ ¦| Provide all the details in the in-text citation – no need for an entry in the reference list. | Enter the in-text citation manually. | It is very important that you check your department' s or school’s assignment guide as some details e. g. punctuation, may vary from guidelines on this

Sunday, September 15, 2019

Application of Ict in Library

Application of ICT in Libraries URL: http://unllib. unl. edu/LPP/anunobi-edoka. htm Use of ICT Facilities for Serials Functions in Southern Nigeria Federal University Libraries Chinwe V. Anunobi Ph. D Digital Librarian Nnamdi Azikiwe University Awka, Nigeria Benson E. Edoka Professor Department of Library and Information Science University of Nigeria, Nsukka Nsukka, Nigeria Introduction User expectation from any information providing system is to make available directly or remotely and in real time the needed information, format not withstanding.In the university environment, the library a major information providing system supports teaching, learning and research with information materials of various types. Among these diverse information materials, serials are needed especially by faculty and research students. Before the development and use of ICT facilities for capturing/acquisition, processing dissemination and retrieval of information, serials operations were predominantly manu al.However with the development of ICT based library service which brought with it self service and simultaneous access to resources (Womboh & Abba 2008), peoples' interest switched from print to electronic information. Furthermore, serials operations in developing countries which was besieged with problems associated with cost (Millis 1992, de Marcas 2000; Aina 2003), inadequate acquisition and processing tools (Szilvassy 1996), competency and accessibility problems (Cohen 1989 and Mullis 1992), embrace the use of ICT facilities as an approach to overcome some of the mentioned problems.This is necessary since according to Ajayi (2003) any industry information or any other which ‘sidelines ICT has simply signed a death warrant' The ICT facilities applied in the library in general and serials unit in particular are based on the functions performed therein. The functions performed in the university serials unit as indicated by Tuttle (1983) are acquisition, processing, public se rvice and preservation. These functions are synonymous with the functions performed in the university library though with some peculiarities emanating from the nature of serials.Therefore ICT facilities used in the broad university library are also applicable to the serials unit but also with peculiarity occasioned by the nature of serials. These services and operations have been transformed using ICT. Aina (2004) informed that there is efficiency in resource organization as delivery and dissemination of information have become effective and easy. Repetitive and routine tasks in the library have been eliminated. Furthermore, the availability of bibliographic database, full text documents and digital library collection is now taken for granted as noted by Chesenga (2004).The IT (ICT) facilities use in the library is defined by the American Library Association (1993) as â€Å"the application of computers and other technology to the acquisition, organization, storage, retrieval and di ssemination of information. Ifidon (1985) enumerated the functions available for ICT use in the library to include ordering and acquisition with the following activities: ordering, receiving, settlement of invoice and administration of records and expenditure..Further to that, Oketunji (2001) and Chesenga (2004) listed library functions in which ICT could be applied to include acquisition, cataloguing, circulation, serials control, selective dissemination of information services and preparation of management information. Furthermore, the application of ICT facilities in the library could be in the stand alone or integrated form. Many countries and institutions are at varying level of ICT application in their library operation.Islam and Islam (2007) documented the use ICT in libraries in Bangladash and informed that though the use started between 1964 and 1995, progress was not made until 1996. In Nigeria many universities are at the advanced stage of ICT use in library operations. A nunobi and Benard (2007) informed that in their study of ICT availability for library operations in the Imo state of Nigeria only two of the four academic libraries; Federal University of Technology Owerri and Imo State University show evidence of using ICT for library operations.Emorjorho, &Nwalo (2009) found in their study that only very few libraries in the Niger-Delta of Nigeria use ICT in library operations where university libraries have more ICT facilities than the special libraries. Nok(2006) documented the use of ICT in Kashim Ibrahim library, Ahmadu Bello University Zaria while Ekpengong( 1997) presented the situation in special libraries in Nigeria. Ani, Esin and Edim(2005) also studied the use of ICT in Nigeria University libraries.For serials operation, Agbaje (2002:27) informed that â€Å"information technology can be an effective hand–maid to serials management at every stage of management process and irrespective of content, use, format and overall strategy a dopted for serials management by the organization in question† Akinyotu (1977), Alabi (1985), Oketunji (2001) Agbaje (2002) and Oni (2004) noted that using various approaches, ICT facilities in serials unit can be for the following functions and activities: subscription control, procurement process, order preparation, fund analysis and accounting.They can also be used for bibliographic file control, cataloguing of new serials, preparation of serials record entries and transaction control. Effecting serials additions, changes and deletions or collection control can be performed with ICT facilities. Services and preservation functions such as servicing request for serials publication, binding control file, missing issues, holdings accession of want list as well as union lists are amenable to ICT facilities use.In their findings on the use of computer for library services in Bangladesh, Islam and Islam (2007 ) discovered that all the libraries surveyed used ICT for serials contro l as well as other activities. The services provided according to them include CD-ROM searching, online searching, online networking, photocopying, online information services and database searching services. In Nigeria according to Ikem and Ajala (2000), preliminary use of ICT in the library started with its use to produce Union list of Serials sponsored by Committee of University Librarians of Nigeria.That notwithstanding, its continuous use for various serials function is yet to be known. Statement of the Problem There are copious studies and opinion on the use of ICT facilities for library functions in general. In Nigerian university libraries, ICT facilities were primarily used for serials functions and are still in use. However not much has been found in literature as regards the areas of serials functions they are used, and the facilities in use. Hence the survey tends to address this gap by identifying the extent of ICT use for serials operations.Objective of the Study †¢Identify the serials operations performed with ICT facilities in southern Nigerian federal university libraries; †¢Determine the serials public services performed with ICT; †¢Find out the ICT facilities used for these serials operations; †¢Ascertain if the use of ICT facilities in serials unit of the libraries is a determinant to their use for serials operations. Research Questions †¢What serials operations are performed with ICT facilities in southern Nigeria Federal university libraries? In which serials public services are the use of ICT employed in Nigerian federal university libraries? †¢What ICT facilities are used for these serials operations? †¢Does the use of ICT facility in serials units of the libraries under study determine its use for serials operations? Significance of the Study The result of this survey will help academic libraries which do not apply ICT facilities for serials functions recognize areas of serials operation in which ICT can be used, and the ICT they can use. With that they can strategize on their use.For libraries using ICT facilities for various operations, they will be acquainted with other areas ICT can be employed in serials operation and the institutions applying such. Donor agencies will also be aware of the state of ICT facilities application in Nigerian university serials operation and decide on the areas to assist such institutions. Data Collection The work covered all the federal university libraries in the three of the six geopolitical zones in Nigeria namely South-East (SE), South-West (SW) and South –South (SS). The three zones comprise seventeen states with 13 federal universities.The various zones and their inclusive universities are: South East(SE): University of Nigeria, Nsukka,(UNN), Federal University of Technology Owerri(FUTO), Nnamdi Azikiwe University Awka (NAU), Michael Okpara University of Agriculture Umudike(MOUAU) ; South-South(SS): University of Calabar(UNICAL), Un iversity of Port Harcourt(UNIPORT), University of Uyo(UNIUYO); and South West(SW): University of Ibadan(UI), Obafemi Awolowo University Ile-Ife(OAU), University of Lagos(UNILAG),University of Benin(UNIBEN), Federal University of Technology Akure(FUTA), and University of Agriculture, Abeokuta (UNAAB).Questionnaire and observation checklist were employed to gather facts and opinion of serials staff from 11 of the 13 federal universities libraries. No samples were taken from FUTA and NAU as they had no well developed serials unit at the time of this study. Purposive sampling technique was used to select 55 from the 107 serials staff in the universities under study consisting of five (5) serials staff each including the Serials Librarian and any other four (4) staff which are responsible for acquisition, processing, user services and preservation in the serials units.Self developed questionnaire instrument made up of 5 items were distributed to the 65 staff. Items 1 to 3 of the question naire were developed along dichotomous checklist while items 4 and 5 were weighted on four Point Likert-like scales. The observation checklist made up of three (3) observable items was developed to enable the researcher observe serials functions and ICT facilities used in the serials unit of the studied universities. Answers to the research questions were provided for using tables, percentages, means and graphs. A midpoint mean score of 2. that is the average of the individual scores was accepted for items developed on four Point Likert–like scales. A 50 percent positive response was accepted for items analyzed with frequency and percentages. Results The result of the analysis are presented to reflect the objectives of the research which include Identifying the serials operations and public services performed with ICT facilities in the universities, identifying the ICT facilities used in the serials units and ascertain if the use of ICT in serials units determines its use for serials operations.Serials Operations Performed with ICT The study ascertained through observation in the Serials units of the studied universities functions performed with ICT facilities. The result of the Observation checklist is presented in Table 1. It shows that all serials functions in OAU are performed with ICT facilities; UNAAB and UI have 75 percent of their serials functions performed with ICT. Half of the functions (50 percent) are performed with ICT in UNILAG, UNIBEN, UNICAL, MOUAU and FUTO.UNIUYO and UNN perform only processing and public services serials functions with ICT respectively while none of the functions is performed with ICT at UNIPORT. Considering the 50 percent bench mark for acceptability, only UNIUYO, UNIPORT and UNN do not perform serials functions with ICT. Other libraries do. Table 1: Observation Checklist on the Various Serials Functions Performed with ICT facilities S/NUniversitiesSerials FunctionsTotalpercent AcquisitionProcessingPublic servicesPre servation 1FUTO00xx250 2MOUAU00xx250 3UNN00x0125 4UNIUYO0x00125 5UNICALxx00250 6UNIPORT 000000 UNIBEN00xx250 8UNILAGx0x0250 9UIx0xx375 10OAUxxxx4100 11UNAAB0xxx375 12Total448621 13percent36. 3636. 3672. 7254. 55 NOTE: x=ICT used; 0= ICT not used The Table also shows that 54. 55 percent and 72. 72 percent of the libraries perform serials preservation and public services functions with ICT facilities respectively. A 36. 36 percent of the libraries perform acquisition and processing functions with ICT facilities. Hence serials public services and preservations are the major serials functions performed with ICT in the libraries studied considering the 50 percent bench mark.Serials Public Services Performed with ICT Again, an observation was made to identify serials public services performed with ICT facilities. The observation checklist is presented in Table 2. The Table shows that UNAAB and MOUAU provide 85. 71 percent of their serials public services with ICT facilities. UI had 71. 43 percent of the services provided with ICT. A 57. 14 percent of such services were provided with ICT at UNILAG, UNICAL and FUTO. Others including UNIUYO (14. 29 percent), UNIBEN (28. 57 percent) had low use of ICT for serials public services functions.None of the services listed was provided with ICT at UNIPORT. The percentage of university libraries using ICT facilities for the various serials public services is as shown in the Table reveals that 81. 82 percent and 73. 73 percent of the studied libraries used ICT facilities to access serials and article titles respectively. ICT facilities were used to access abstract; index and the retrieval of serials titles by 54. 55 percent and 45. 45 percent of the libraries respectively. None of the libraries used ICT to access physical serials while 36. 5 percent used ICT to retrieve full text of serials. Using a 50 percent benchmark the result implied that those ICT facilities are used for access to abstract, serials and article titles in th e universities studied. Table 2: Observation Checklist on the Various Serials Public services performed with ICT Facilities S/NUniversitiesSerials Public ServicesTotalpercent Access to abstractsAccess to IndexesAccess to Serials titleAccess to article titlesLocation of physical serialsRetrieval of Serials titlesRetrieval of full text Serials 1FUTOxxxx000457. 14 MOUAUxxxx0xx685. 75 3UNN000000000 4UNIUYO00x0000114. 29 5UNICAL00xx0xx457. 14 6UNIPORT 000000000 7UNIBEN00xx000228. 57 8UNILAGx0xx00x457. 14 9UIxxxx0x0571. 43 10OAUxxxx0x0571. 43 11UNAABxxxx0xx685. 75 12Total659805437 13percent54. 5545. 4581. 8273. 73045. 4536. 36 NOTE: x=ICT used; 0= ICT not used ICT Facilities Used for Serials Operation in Serials Unit Answer to the research question on the ICT used for serials operations was found by the Researcher's observation of the use made of ICT facilities in serials units of the various university libraries.The result of the observation is presented in Table 3. The Table shows that only 50 percent of the listed ICT facilities were used in the serials units of UNAAB and UI. UNIBEN, MOUAU and UNILAG used 42. 86 percent and 35. 71 percent of the facilities respectively. UNICAL and UNIUYO used 28. 57 percent and 14. 29 percent respectively while UNIPORT, UNN and OAU each used 7. 14 percent of the ICT facilities in their serials units. None of the facilities was used at the time of this study in FUTO Serials unit. Table 3: Observation Checklist on the Various ICT Facilities Use in Serial Unit.S /NUniversitiesICT FACILITIESTotalpercent PCCPSFaxCD-RCDWCDCDELANWIntOP 1FUTO0000000000000000 2MOUAUxxx00x00x00000535. 71 3UNN0x00000000000010 4UNIUYOxx000000000000214. 29 5UNICALxXx00000x00000428. 57 6UNIPORT 0x00000000000017. 14 7UNIBENxx000x0x00x00x642. 86 8UNILAGxx0xxx00000000535. 75 9UIxx000x00x0x0xx750. 00 10OAU0x00000000000017. 14 11UNAABx x00xx000x0xx750. 00 12Total7831151130302338 NOTE: PC= Personal Computers; C= Copier; P= Printer; S= Scanner; CD-R = CD-ROM; CDW= CD –Writer; D= Diskette; E= E- Mail; LAN=Local Area Network; Int= Internet; OP= OPAC.X= ICT Used; 0 = ICT Not Used. Considering the percentage of the universities using each of the ICT facilities, the result shows that majority of the university libraries (72. 73 percent) used photocopier for its serials functions. This was followed by 63. 64 percent and 45. 45 percent which used personal computers and CD-ROM respectively. Printers, diskettes, LAN and OPAC were each used by (27. 27 percent). The Internet (18. 18 percent); and scanner, fax machine, CD writer and CD changer (9. 09 percent) had very low use in the serials units studied.None of the libraries was using E-Mail and WAN facilities in the serials unit for serials functions. Considering the 50 percent Bench mark, only personal computers and photocopiers were the ICT facilities being used by the Serials units of the studied universities libraries? ICT Facilities Used in Serials Unit as a Determinant of Its Use for Serials Operations A cross-tabulation of the result was made to show the percentage serials functions, serials public services and ICT facilities used in various serials units of the individual universities.The result is presented in Table 4. It shows that although OAU had all its serials functions (100 percent) performed with ICT facilities and 71. 43 percent of its serials public services performed with ICT; it had very low use of ICT facilities (7. 14 percent) in its Serials unit. FUTO which also had 50 percent and 57. 14 percent of its serials functions and serials public services performed with ICT respectively had no single ICT facilities in its serials unit. There was also low indication of ICT facilities use in the Serials units of UNILAG (35. 71 percent); MOUAU (35. 1 percent) and UNICAL (28, 57 percent) despite their average use for serials functions and serials public services. UNN and UNIPORT though do not perform serials functions or public services with ICT had indication of ICT facilities in its serials unit (7. 14 percent). UNIUYO had low ICT facilities use in the Serials unit as well as low use for functions and serials public services. The result implied that the serial functions and serials public services in the Serials units performed with ICT in some cases were not determined by the ICT facilities available in the Serials units of the respective university libraries.Table 4: Cross Tabulation of percent Serials Functions, Serials Public Services performed with ICT and ICT facilities Used in Serials Units of Southern Nigerian Federal University Libraries S/NUniversitiesPercent Serials Functions With ICTPercent Serials Public Services with ICTPercent ICT Facilities Used in Serials Unit 1FUTO5057. 140 2MOUAU5085. 7135. 71 3UNN000 4UNIUYO2514. 2914. 29 5UNICAL5057. 1428. 57 6UNIPORT 007. 14 7UNIBEN5028. 5742. 86 8UNILAG5057. 1435. 71 9UI7571. 4350. 00 10OAU10071. 437. 14 11UNAAB7585. 7150. 00 Discussion of FindingsFrom the findings, it is apparent th at there is a general low use of ICT facilities for serials functions except in the areas of serials public services and preservation (Table 1). This is related to the findings of Siddique (1997) in his work in Saudi Arabia, where only two of seven libraries studied applied ICT in serials control. The low use of ICT facilities for acquisition and processing may be attributed to the non-availability of serials software which will enable the use of ICT for the very complex acquisition and processing activities involved in serials functions.An explanation for this could be found in the works of Anunobi and Benard (2007) where many of the libraries studied do not have library software and those with such were yet to activate their serials module. However, that some libraries like OAU perform all its serials functions with ICT and others like UNN and UNIPORT are not performing any of its functions with ICT shows that there is a great disparity among these libraries with respect to the ap plication of ICT facilities for serials functions especially among the geopolitical zones.The disparity could be attributed to the disposition of these libraries to the major hindrances to ICT application in serials functions. This is also related to the findings of Islam and Islam (2007) that there is disparity in the use of computers and its accessories in library services in Bangladesh. Furthermore, the increased use of ICT facilities for serials public services reflected in many of these libraries (Table 2); for serials and articles titles access buttresses the fact that these university libraries are providing serials public services with ICT facilities.It also implies that many of them have their automated serials holdings being domicile in personal computers or that they possess the Union List of Serials on CD-ROM which users can access. This is of the same standing with the findings of Tseng et al (1990) who noted in his study that 55 percent of the libraries studied have th eir serials holdings automated. There is also the possibility that some major abstracts like Chemical, Biological, LISA, and AJOL abstracts may be available in these libraries on CD-Rom or Online.Where only the abstract is available, or there is absence of digital library, full text retrieval may not be possible; hence the low university representation on retrieval of full text serials. The responses on ICT facilities use in serials operations still confirms that the libraries studied use little or no ICT facilities in serials functions. This confirmation was derived from the below bench mark for all the facilities outside personal computers and photocopiers (Table 3). The close to 50 percent average score for CD-ROM implies that its use for serials function is becoming prominent.Such is expected since some libraries like MOUAU and UNAAB have the Essential Electronic Agricultural Library (TEEAL) therefore are providing access to serials and article titles using CD-ROM facilities. Ag ain, since the use of Internet and OPAC has low response, there is the tendency that the serials public services and preservation functions are provided with CD-ROM in these libraries. The use of scanner and fax machine by only one library suggests that the studied libraries were yet to digitize their serials. In addition to that they could be turning to new technology i. e. he Internet in place of fax. The information presented on the cross-tabulation of percentage serials functions, serials public services and ICT facilities used in serials functions (Table 4) has made series of suggestions. Though some of the University libraries performed serials functions and public services with ICT facilities, they had little or no ICT facilities in their serials units. This is similar to the finding of Anunobi and Nwakwuo (2008 ) where majority of the university libraries in Eastern Nigeria have not embraced the use of ICT for its operations serials inclusive.This could mean that such functi ons and services were performed in other units or a designated unit outside the serials units. Observation showed that in most of these libraries that provided serials functions and public services with ICT facilities but with little or no ICT facilities in their serials units have distinct ICT, IT, Systems or Computer centres from which all these functions were performed. The implication of these findings is that the use of ICT facilities for serials functions is gradually disintegrating the compartmentalisation of serials units and other units of the university library.Hence it is likely that in not too long a time, serials functions and public services with the application of ICT facilities could be performed from units outside the serials unit in most of the libraries in southern Nigeria. The low positive response on the application of the Internet shows that the studied libraries were not utilizing the free electronic serials available on the Internet to augment the limited ser ials subscription made by some of these libraries. These libraries also deny users the opportunity of using some fee-based serials that are offered freely to developing countries like Nigeria.Such serials include Access to Global Online Research in Agriculture (AGORA); Health International Network Access to Research Initiative (HINARI); Online Access to Research in the Environment (OARE), EBSCOhost, Commonwealth University Documents Online (CUDOS), CAB Abstract etc. If the scenario is not changed, serials users will bypass the library for alternative information providers, thus confirming the conception of Morino (1998) that if libraries do not rise up to the challenges of the technological changes, they will never again be in control of information. Summary and ConclusionThe following deductions and conclusive evidences are made from the findings of this research: †¢Serials functions in the Southern Nigeria federal university libraries are still predominately manually performe d with ICT application being more prominent in the public services and preservation functions. †¢Public services activities involving the use of ICT facilities are mainly access to and retrieval of serials and articles titles. †¢Though a few of the libraries use Internet, LAN and OPAC, photocopiers, personal computer, and CD-ROM are the most commonly used ICT facilities in the serials unit. The low availability and use of ICT facilities in serials units of the university libraries is not a determinant of its use for serials operations. Hence many serials operations are performed with ICT facilities outside the serials units. It is recommended that university libraries should take a firm decision whether to equip serials unit with ICT facilities and affect all serials operations in the unit or have a systems unit where ICT related operations are carried out including serials. University libraries should also solicit aid from donor agencies in the area of ICT hardware and so ftware for serials functions ReferencesAgbaje, A. A. (2002). Great expectations: Serials management and information technology. In Madu E. C. , & Dirisu, M. B. (Eds. ). Information science and technology for library schools in Africa (pp. 25-36). Ibadan: EVI-Coleman. Aina, L. O. (2003). Strengthening information provision in Nigerian university libraries: The digital option. Paper presented at the 41st Annual National Conference & AGM of the Nigerian Library Association at Tarker Foundation, Markurdi, 7-12 September. Aina, L. O. (2004). Coping with the challenges of library and information delivery services: The need for institutionalized professional development.Nigerian Library Association Conference Proceedings, p. 4 Ajayi G. O. (2005). E-government in Nigeria's e-strategy. Paper presented at 5th Annual African Computing and Telecommunications Submit, Abuja, Nigeria. Akinyotu, A. (1977). Library automation: A state of the art review. Paper presented at the workshop on library aut omation in Nigeria held at the Conference centre, University of Ibadan 6-10 March. Ani, O. E. , Esin, J. E. , & Edem, N. (2005). Adoption of information and Communication Technology (ICT) in academic libraries: A strategy for library networking in Nigeria.The Electronic Library 23 (6): 701-708. Anunobi, C. , & Benard, I. (2007). Availability and use of ICT resources in Imo State academic library services. Coal City Libraries 5&6: 34-41. Anunobi, C. V. , & Nwakwuo, O. (2008). The state of ICT in southeastern Nigeria. Samaru Journal of Information studies 8 (1): 35-43 Alabi, G. A. (1993). Information technology: Whither Nigerian libraries and documentation centres. Leading Libraries & Information Centres 1 (2): 27-35. American Library Association (1983). The ALA glossary of library and information science. Chicago: ALA. Ballentyne P. (2003).Information management trends. INASP Newsletter 23: 5-6. Chesenga, J. (2004). ICT in libraries: An overview and general introduction to ICT in lib raries in Africa. INASP ICT Workshop, Kopanong Hotel & Conference centre, Johannesburg S. Africa 21st -23rd July. ( www. INASP. info/ISP/ICT-workshop2004 ) Islam, S. , & Islam, N. (2007). Use of ICT in libraries: An empirical study of selected libraries in Bangladesh. Library Philosophy and Practice. Available: http://unllib. unl. edu/LPP/shariful. htm Mullis, A. (1992). Serials. In. Michael, P. (Ed. ), Non-standard collection management (pp. 3-115). Aldershot, England: Ashgate. Oketunji, I. (2001). Computer application to libraries. Paper presented at the 39th Annual National Conference and AGM of the Nigerian Library Association at the Imo Concord Hotel Owerri, June 17-22. Oketunji, I. (2001). Libraries and the Internet connectivity: What benefits? In Lasis J. , Odunsanya,O. K. , Sonaike, S. E. A. , & Osinulu L. F. (Eds. ), Automation of cataloguing practices in Nigerian libraries (pp. 32-40), Ijebu-Ode: Nigerian Library Association, Cataloguing, Classification and Indexing Sectio n. Oni, F. A. (2004).Enhancing the performance of library operations through appropriate IT. In Madu E. C. (Ed. ), Technology for information management & services: Modern libraries & information centers in developing countries (pp. 95-109). Ibadan: Evi-Coleman. Siddiqui, M. A. (1997). The use of information technology in academic libraries in Saudi Arabia. Journal of Librarianship and Information Science 29 (4): 195-203. Szilvassy, J. (Ed. ) (1996). Basic serials management handbook. IFLA Publications 77. Munchen: K. G. Saur. Tseng, S. C. , Arcand, J. C. , Brugger, J. M, Finn, M, Olson, A. J. , & Somers, S. (1990).Serials standards work: The next frontier. Library Resources & Technical Services 34 (2): 139-157. Womboh, B. S. H. , & Abba, T. (2008). The state of information and communication technology (ICT) in Nigerian university libraries: The experience of Ibrahim Babangida Library, Federal University of Technology, Yola. Library Philosophy and Practice. Available: http://unllib. unl. edu/LPP/womboh. htm ? Explanation and opinion From the article above, we know that there is a general low use of ICT facilities for serials functions except in the areas of serials public services and preservation (table 1) in libraries.Serials functions in the Southern Nigeria federal university libraries are still predominately manually performed with ICT application being more prominent in the public services and preservation functions. This is because in Nigeria, many of the libraries studied do not have library software due to the expensive price of the software. However, it is shown that 55% of the libraries have an automated system regarding the serials storage system. It also implies that many of them have their automated serials holdings being domicile in personal computers or that they possess the List of Serials on CD-ROM which users can access.Furthermore, the use of Internet has low response,so there is the tendency that the users are provided with CD-ROM in these libraries. This means that the use of CD-ROM is more dominant than internet in Nigeria. The low positive response on the application of the Internet in libraries shows that the studied libraries were not utilizing the free electronic serials available on the Internet to replace the limited serials subscription made by some of these libraries. This maybe because of the not skilled people in Nigeria. In my opinion, the libraries in Nigeria should optimize the use of ICT.This can be done by having seminars about how to use the internet (how to browse for information, download, save files, etc). Even though the libraries have been changing so much that it changed from paperwork-based into ICT-based system. Though a few of the libraries use Internet, photocopiers, personal computer, and CD-ROM are the most commonly used ICT facilities in the serials unit. This is because the Nigerian people don’t know the technology of internet yet and they are still a developing country. ? Impac t to society: It is clear that by using ICT in libraries, there will be some impact to the society.For example it will change the way of borrowing books, the way of storing data of customers, etc that will be discussed below. Advantages: 1. It will be faster to store information of customers. By using ICT, the process of storing customers’ data will be faster because it only needs us to type which is significanly faster rather than to write 2. The data that is stored will also be more secure by using ICT. When the data is stored using computer, the risk of lost data will be very low compared to when using written forms of customers’ data. This is explained because the risk of losing paperwork is a lot more compared to the risk in computer. . It will be easier to modify / change the data stored. When using computer, we can modify data very easily. This will help the librarians greatly so their job will be much easier too. They don’t need to re-write all the custo mers information again like if they are using paperwork. 4. The process of borrowing books will be much faster and in an efficient way. By using ICT, we can just scan the book barcode when a customer wanted to borrow a particular book. This will be faster since they only need to scan (not to write the description of the book). 5. We can know when a particular customer haven’t return the books that they borrowed.This will reduce the risk of losing books in the library and also will help customer to be discipline to return the books that they borrowed on time. When using the old type of storing data, the librarians will be lazy to check because there are so much data that they have to search. However, they can filter data using ICT and they will work with more tenacity. 6. The society will have more access to information that is available by using the internet. Customers can use the computers that are provided in the library and search for information that maybe not available i n the library’s books.This will improve the knowledge of society and this will lead to a better society with up-to-date information. 7. It will be easier for the society to print, send e-mail, do research etc by using the computers provided in the library. Thus enabling them to score high in their report and moreover giving them a future career prospect. Disadvantages: 1. There will be unemployment for some librarians since the library doesn’t need a lot of librarians anymore. The librarians whose old job were to check / write data in paper will be no longer needed since the ICT will only need fewer librarians to do the same amount of work. . In Nigeria, many people doesn’t seem to understand ICT well, so there will be problems when they are using the ICT system. For example, internet service and computers. They won’t be that interested in using the computer because they don’t know how to use it. So, if they force themself to use computer, there wi ll be probability that they will damage the computers’ hardwares, or the computers will be abandoned with no users using them. 3. The cost of implementing the ICT system is not cheap. It usually requires a lot of money that the university have to provide.This will have impact on other university facilities. Because of the implementation of ICT, other facilities will have only a low budget and this can be bad for the university students. From the list of advantages and disadvantages before, we all know that the ICT system in library have a significant impact to the society. For me, even though it has some disadvantages, there are a lot more advantages that ICT system offers. It will also modernize the local people by providing more and more information from abroad, not only from the books. Thus, ICT system is very important to the better qualified of individuals.