Monday, December 30, 2019

What Is Delphis LeftStr Function

Declaration:  function  LeftStr(const  AString: AnsiString;  const  Count: Integer): AnsiString;overload;  function  LeftStr(const  AString: WideString;  const  Count: Integer): WideString;  overload; Description Returns a string containing a specified number of characters from the left side of a string. AString represents a string expression from which the leftmost characters are returned. Count indicates how many characters to return. If 0, a zero-length string () is returned. If greater than or equal to the number of characters in AString, the entire string is returned. Example var s : string; s : ABOUT DELPHI PROGRAMMING; s : LeftStr(s,5); // s ABOUT

Sunday, December 22, 2019

Online Advertisement On Their Own Will Essay - 954 Words

click on online advertisement on their own will. In a study conducted by bannerblindness.org, 50% of users never click on an online advertisement while 33% click on more than 5 ads per month. Question 15 This result show a similar result with the online advertisement channels, the most commonly click-on web advertisement are social media ad and follow by adwords advertisement and email advertisement. A recent study has shown that social media is become more important as an online channels for company to communicate with their potential customer through the act of sharing and participating in a variety of post and activities. (Ashley and Tuten, 2014) Question 16 This question is established to understand the overall experience and effect on a user who have click on a particular web advertisement. 28% of respondents actually purchased the advertised service or products while 48% actually left with a positive influences towards future purchases even though a sale did not happen. A study by an advertising agency show that only 20% of consumers who successfully purchased arrived at the website through clicking on the web banner. The other 80% returned to the website and completed their purchases later on after viewing the advertisement. (Haugtvedt, Machleitand and Yalch 2005) Question 17 With 24% of respondents indicate that they never click on a web advertisement on free will, we try to understand what might prevent them from doing so. As such, 53% of the respondentsShow MoreRelatedImpact Of Advertising On Female Identity Formation1592 Words   |  7 Pageshighly concerned with beauty. From magazine to television advertisements, women are bombarded with images of perfection—perfect figure, perfect hair, and perfect skin. Moreover, advertisements sell products that would help improve women’s appearance. The problem with these advertisements is the subjectivity of beauty as a whole. Every individual has his or her own preference and perspective on what it means to be beautiful, but for advertisements beauty is obtaining perfection. One of the most controversialRead MoreThere are people at different ages shop every day, either online or in a store. People shop not800 Words   |  4 Pagesdifferent ages shop every day, either online or in a store. People shop not only for living essentials, but also for their needs in the society. Teens, too, shop for their reputation and shop whenever they can. Drew Desilver, a senior writer at the Pew Research Center, stated that almost eighty percent of American teens shop online, but almost eighty percent of the American teens prefer to shop in stores (Desilver). There are many reasons why teenagers shop online even though they prefer to shop inRead MoreThe Gatorade Sports Drink Company1701 Words   |  7 Pagesstep. Price Starting out Gatorade was more of a premium pricing but that gave way to a competitive pricing scheme after competition entered into the market. Promotion Gatorade does a lot of promoting. They are online though YouTube ads, ads on sports sites like the NBA and their own official website. Gatorade is also the official drink of many sports organizations such as the NBA, NFL, USA basketball, US Soccer Federation, NHL, MLB, MLS, WNBA, high school sports teams, and collegiate athleticRead MoreOnline Consumer Behavior1714 Words   |  7 PagesOnline consumer behavior Online purchasing is becoming more and more practical thing for contemporary customer. It is explained by high internet penetration in every country, lower cost than in retail network, door to door delivery. Internet plays an important role nowadays; therefore it creates a new market, which sometimes is quite difficult to measure. Online shopping is different from the BM shopping due to the fact that there is no physical presence of goods, from other standpoint internetRead MoreHow Do Google’s Online Ad Revenue Sources and Strategy Differ from Yahoo’s? Which Online Ad Strategy Is Superior for Attracting Advertising from Small Companies? for Attracting Advertising from Large Companies? Defend Your Position.1427 Words   |  6 PagesHow do Google’s online ad revenue sources and strategy differ from Yahoo’s? Which online ad strategy is superior for attracting advertising from small companies? For attracting advertising from large companies? Defend your posi tion. Answer: I personally believe that there are no exact things that one company possesses all range of specialty but different company possess different specialty. Like Google, it generally possesses the link-based text of advertising. One of its programs, AdwordsRead MoreHow Can the Web Give a Company a Competitive Advantage?875 Words   |  3 Pagestechnology especially for business, if one knows how to use it as an advantage. There are many ways that a website will be in one’s favor and make it an advantage for companies. Most leading companies as well as some small businesses use the web for advertisement and also for selling products. Some of the advantages of using the web are: availability, customer reviews, more customers, and marketing. One of the most useful advantages for the companies is their availability increases. By using the web theyRead MoreRecent Changes in the Print Industry924 Words   |  4 Pagesexplosion, the print industry has adapted to digital technology via, providing digital subscriptions (paywall), eBooks, and mobile adaptation and advertisements. The print industry has adapted recently to providing digital subscription to its readers. The print industry mainly makes their money through the distribution of their print product. Advertisement through selling their print product is also a way in which they generate revenue. For example a local city newspaper makes money through havingRead MoreDescribe Business Models1230 Words   |  5 Pagesmuch as this organization is engaging intranet in sharing knowledge, they are also using it in displaying available alternatives for employees, which helps workers to enhance their career. Using the intranet, National American Bank posts vacancy advertisements, which ensure that employees have the chance to apply for better internal jobs. Therefore, it is evident that organizations should consider implementing an intranet in their business operations (Morley Parker, 2012). Select two ecommerce websitesRead MoreShould People Abandon Traditional Marketing1366 Words   |  6 PagesShould people abandon traditional marketing in favor of online advertisement? The human brain is a remarkable organ. The brain is considered to be the all knowing ruler of one’s body and rightfully so. The list of duties a brain does on a daily basis includes dictating one’s vision, their bowel movements, and most importantly, personality. Think of a person’s personality as being a mixture of experiences. The moments that you can remember are the building blocks of your identity in which you baseRead MoreTaking a Look at Expedia Inc.885 Words   |  4 PagesHotels.com, Egencia, Expedia Local Expert, Hotwire Group and Vebere.com. It was created by the Rich Barton and Lloyd Frink and can be utilized by almost every country around the globe. (Inside Expedia, online) The online travel agency is one of the leading travel companies which is working online. The Expedia.Com offers the customers plans and services to travel around the world and to reserve the places of their choice. Expedia is currently working through Facebook, mobile apps and website offering

Saturday, December 14, 2019

Ethics on Smoking Industry Free Essays

INTRODUCTION: Ethics occupy an important place in today’s modern business world. Every organization makes use of ethics to make day-today decisions and fulfill societal expectations. This essay brings to light ethical and social responsibility that every individual and company should follow in order to become better citizens for society. We will write a custom essay sample on Ethics on Smoking Industry or any similar topic only for you Order Now Essay presents analysis based on real case of Philip Morris, a tobacco company in U. S. A versus Mayola – a widow, who took legal action against company for her husband’s death due to smoking. Essay draws balanced argument based on evidences about unethical behavior of tobacco company and smokers personal responsibilities for their actions. We have used Ethical decision-making model of Lagenderfer and Rockness to frame our analysis. ETHICS BUSINESS Ethics in simple terms means set of moral principles or list of rules, which can determine whether particular action undertaken is ‘right’ or ‘wrong’. All the activities undertaken by society are based on ethics. Ethics can be personal as well as professional. Personal ethics are based on individual’s values, beliefs, attitudes and actions while business ethics are based on certain principles or code of conduct to guide individual or a group in accordance with societal expectations. Business ethics can be defined as â€Å"study of business situations, activities and decisions where issues of right or wrong are addressed†(Crane, A Matten ,D, 2007,P. 5). Thus, ethics helps in making decision and is a key for solving problems. Today, society is facing considerable increase in number of ethical issues such as fraud, exploitation, misleading advertisement and increasing pollution. Birt, Chalmers, Beal, Brooks, Byrne, Oliver, 2008, P. 65). CORPORATE SOCIAL RESPONSIBILITY It is essential for every organization to undertake corporate social responsibility along with its goals and objectives. According to (Birt et al. , 2008, p. 70) Corporate social responsibility can be referred to responsibility that an entity has to all its stakeho lders, including society in general and physical environment in which it operates. There are many companies, which lack sense of corporate social responsibility and acts against interest of society. RELEVANT FACTS DETERMINED UNDER CASE: Today, business is giving rise to numerous ethical issues, as many companies are involved in exploiting its customers, selling harmful products in markets, false marketing of products and increasing environmental and health issues. Many tobacco companies like Phillip Morris are selling harmful and addictive products like cigarettes that cause serious diseases like lung cancer and heart attack. Analysis of Phillip Morris v. Mayola, Williams case brings down certain relevant facts that give rise to ethical issues. Mayola took a legal action on Philip Morris on the grounds of false and misleading advertisement and marketing undertaken by company for its products. It is fact that Philip Morris knew that tobacco was harmful for health still he advertised his product as non-addictive and safe and Williams death was caused by smoking. Second, fact is that Philip Morris appealed solely against damages that company had to pay to other smokers who did not bring any actions against court. Their appeal was only based on excessive damages that company was supposed to pay to strangers. This clearly indicates that he is very well aware of harms caused by his cigarettes to smokers and did not appeal on the grounds that his products were safe and less addictive. It is also relevant fact that Supreme Court made decision in favor of Philip Morris that company is not liable to pay excessive damages to Ms Williams on the grounds that damages were proper under Oregon statute but was excessive under federal constitution (BBC article, 20 Feb, 2007). This indicates that ethical laws are still complex and not clearly stated under constitution. ETHICAL DILEMMAS FOR BOTH SMOKERS AND COMPANY: Ethical dilemma arises when there is a situation with conflict of interest. We have built certain arguments based on ethical dilemmas from perspective of both smoker and company. We have constructed evidence-based arguments on unethical behavior by Philip Morris Company, which includes major ethical issues, such are selling harmful products, misleading and false advertisement, acting against societal expectations and caring out unethical business practice. Company is involved in producing and selling harmful tobacco products that contains high amount of nicotine, are addictive, and can cause serious health issues such as lung cancer and heart attack. Company acts unethically by encouraging people to smoke and their conflict of interest with societal ethical standards and expectations. According to (Janine and Ruth, 2008) company prevents old smokers from quitting and targets young people and children. Company adopts new and innovative marketing approaches to promote its products like direct mail advertising and sending coupons with discounts. Low tar† cigarettes were developed in response to the health concerns of older smokers in 1970, but experts found them no advantageous to health and did not help smokers to quit. Company lacks in corporate social responsibility as they perform activities that are against interest of society in general and physical environment in which it operates. Company undertakes massive fraud by acting d ishonestly having financial motive in mind. Company is involved in false advertisement indicating their products to be less addictive, more filtered and safe. According to ( Rosner, 2006, P. 193-196) company tries to create illusion by sponsoring cigarette cessation programmes and try to make society believe that they act in ethical way, but their real motive behind it is to promote company’s goal of selling cigarettes and meet their financial interests . Their misleading marketing activities makes lots of people to go for smoking. Philip Morris promised to shut down instantly if their cigarettes were found to be harmful but has failed to keep its promise, which gives rise to ethical dilemma. According to (David Silva, 2004, p. 9-22) Company uses their political and economic influence to create an environment that encourages continued consumption of cigarettes. Company is accused of political lobbying. They lobby legislators and officials in finance ministry in order to keep tobacco prices low and thus encouraging people to smoke. Philip Morris was after minimizing total tax burden on cigarettes in order to keep smoking affordable. Article in Ethical Corporation magazine (2004) states that company declares itself responsible and argues that there is increasing demand for cigarettes by customers and if they stop selling it, someone else will take their position. Company tried to safeguard themselves on the grounds that they are selling legal products, which are not banned by government and are acting in ethical way by warning its customers against dangers associated with smoking. Thus, company gives rise to ethical dilemmas as it has an intension to make huge profits by selling harmful products that are responsible for death of millions of people and still trying to gain creditability as responsible company. From perspective of smokers in general, they give rise to ethical issues by consuming harmful products that are not ethically accepted by society and do not take warnings given by companies and government seriously. It is unethical to blame companies solely responsible for damages caused to them and bring their own actions against company. Their behavior can give rise to ethical dilemmas as their actions have a deep impact on their children and makes smoking more desirable for their kids in future. They also lack in personal and social responsibility by giving rise to health issues and environmental concerns for society in general. CONCLUSION: Thus, we conclude that tobacco is one the world’s greatest preventable health problems. According to our analysis, we came to a balanced conclusion that smokers should take responsibility for their actions and companies should behave ethically by making its customers fully aware about the dangers of smoking. It is very essential to undertake combined ethical and social responsibility by both smokers and tobacco companies to avoid millions of deaths due to smoking and to act in favor of societal expectations. Tobacco companies should stop giving misleading advertisement and marketing activities, which indicates their products to be safe and less addictive. They should stop encouraging consumption of tobacco among young and old and should ban children from its consumption. It is the responsibility of companies to support smoking cessation programs and help smokers to quit not just for sake of creating illusion but also to act in favor of societies interest in general and to build better image in society. Company should change their unethical business practices of creating massive fraud to fulfill its financial motive and provide support to government activities that help smokers to quit. Smokers should follow their personal ethics and should take responsibility for smoking. They should take warnings given by tobacco companies and government to quit smoking seriously. They can search on internet for more information or consult doctor to improve heir knowledge about serious health issues caused by smoking. Smokers should not escape from their personal and social responsibilities towards society and their families. It is unethical to bring their own action against company and solely blame company for health issues caused by smoking. It is moral duty and responsibility of every citizen to bear risk associated with their actions. It is responsibility of government to take care of its citizens and find solutions for their health relating issues. We believe that Political parties should not accept any funds from Tobacco Company for their campaign and government should ban any kind of commercial ads for cigarettes in magazine, newspapers or on television. Government should support smoking cessation programs and quitting and should be alert if tobacco company provides any support as they may mislead government by doing indirect advertising for their products. We recommend that there should be strict tobacco control strategy that restricts consumption of all tobacco products. Thus we conclude that it is ethical, moral and social responsibility for smokers, tobacco companies and government to stop consumption and selling of harmful products for betterment of society and environmental concerns. REFERANCE )Birt, J. ,Chalmers, K. ,Beal, D. , Brooks, A. , Byrne, S. , Oliver, J. (2008). Accounting: Business Reporting for Decision Making. (2nd ed). John Wiley Sons: Milton, Old. 2)Crane, A. , Matten, D. (2007). Business Ethics: Managing Corporate Citizenship Sustainability in Age of Globalization. (2ND ed). Oxford University Press: New York. 3)David, A. , Silva,V. ( 2004). Building Blocks for Tobacco Control: a handbook tools for advancing t obacco control in xxist century. Publisher World Health Organization: Geneva 4)Rosner, F. (2006). Contemporary Biomedical Ethical Issues and Jewish Laws. KTAV Publishing House: New Jersey 5)Janine, C. , Ruth, M. (2008). False Promises: Journal of American Geriatrics, 56(9), p1716-1723, 8p, 1 chart retrieved on 5/ 09/2009 from Academic Search Premier Database. 6)Tobacco firm wins payout appeal: BBC news article https://news. bbc. co. uk/2/hi/business/6379767. stm retrieved on 6/9/2009. 7)Philip Morris executive declares his company ‘Responsible’: Article from Ethical Corporation Magazine: http://www. ethicalcorp. com/content. asp? ContentID=2345 retrieved on 8/09/2009. How to cite Ethics on Smoking Industry, Essays

Friday, December 6, 2019

International Of Distributed And Parallel â€Myassignmenthelp.Com

Question: Discuss About The International Of Distributed And Parallel? Answer: Introduction The report has shown the data encryption methods of WiMax and compared them for forming an overview about their system. The report has a second part where the security issues of the WPAN have been analyzed. The overall report has shown the importance of the wireless communication and networking for daily activities. Compare and Contrast Data Encryption Standard of WiMax WiMax (Wireless Interoperability Multiple Access) is a standard for wireless access (802.16) and it is used for developing a network of wireless access among two end points (Desai, 2013). The security protocols of WiMax are PKMv2, EAP, and AES. These above stated protocols of WiMax have helped in forming data security and encryption. Explaining the PKMv2 security protocol PKMv2 or privacy key management protocol version 2 is used for encryption and authorization exchange of crypto keys (Sridevi Rajaram, 2012). The crypto keys help in the process of multicasting and broadcasting of the data traffic. It has been created for overcoming the short comings of the first version of PKM and it uses the standard of both RSA and EAP for security and encryption of data. Figure 1: PKMv2 Protocols (Source: Sridevi Rajaram, 2012, pp-71) The key generated for authentication of the operation is more precise as two standard principles have been used for forming the key (Desai, 2013). The mobile station can be authenticated for the wireless activities and operations by the base station using the crypto keys of mutual authorization. Replay attacks are being dealt by using Nonce. Explaining the EAP security protocol EAP is acronym for Extensible Authentication Protocol and it has primary function of user authentication and device security (Pawlowski, Jara Ogorzalek, 2014). It is used for point to point protocol formation and the process of multiple authentications has been enabled for use by the EAP protocol. Smart cards, password or passphrases, certificates, and authentication using public key are all being used sue to the implementation of EAP. EAP can be mixed with new security features easily and according to the new security feature mixed with EAP, the protocol has been named as EAP-TTLS, EAP-MD5, and EAP-TLS (Kalra Kiran, 2015). The pre-negotiation for the authentication is not needed and the identity request can be sent initially with other queries and request. Figure 2: EAP protocol authentication process (Source: Pawlowski, Jara Ogorzalek, 2014, pp-344) Explaining the AES security protocol AES or Advanced Encryption Standard is the most advanced form of network security and the data is transmitted over the cloud network (Wadi Zainal, 2013). The security protocol has helped in securing the air traffic by data encryption. The keys for the security encryption can be of various sizes and block such as 128, 192 or 256. The AES process has been based on the process of permutation and substitution. AES uses bytes for operations and specific outputs (Kalra Kiran, 2015). Encryption is done in AES by following four processes in sequence and decryption is done by doing the same processes in reverse sequence. Figure 3: AES algorithm overall structure (Source: Wadi Zainal, 2013, pp-414) Security challenges of WPAN technologies WPAN (wireless personal area network) is limited for communicating and data exchange among portable devices like PCs, PDAs, printers, pagers, and mobile phones (Amiri et al., 2013). The devices are inbuilt with two radio surfaces among which one is utilized for cellular network and the other for PAN connection. Bluetooth and ZigBee are the two WPAN technologies whose security challenges are discussed below. Security Challenges of Bluetooth (802.15.1) The security challenges of the Bluetooth WPAN are Inferior Security protocols and Denial of Service attack. Inferior Security protocols: The Bluetooth radio control can be easily misused, as it has higher vulnerabilities for impersonating and eavesdropping (Minar Tarique, 2012). The person in the middle attack can be used for attacking the devices and extracting the information from the device. It would be easily possible as the security of the Bluetooth device is less secured. The attacker of man in the middle sets up two point to point connections for negotiation of the radio frequencies of Bluetooth radio. The inferior security protocols would result in easy damaging and performing of the illicit queries. Denial of Service: The Bluetooth devices are prone to the denial of service attack. The DoS attack would be highly possible for the Bluetooth radio frequency due to the ease of accessing the device facility (Minar Tarique, 2012). DoS occur when the device is sent multiple queries for processing using fake server. It would cease the processing of user generated queries for the devices. The infiltration of the security measures would result in data theft and impersonation of the authentic users. Security challenges of ZigBee (802.15.4) The security challenges of ZigBee WPAN are Key Attacks and Injection and replay attacks. Physical attacks: The devices can be disrupted by the gaining physical access to the devices. The security of the Zigbee devices can be easily bypassed manually. Altering with the hardware and software appliances of ZigBee is easy with the gain of physical access to the device. Hence physical access is the main reason behind the attack on the security of ZigBee devices. Injection and replay attacks: The key based attacks on the ZigBee after mixing with the replay packet attack and injection attack have affect on the activities of the radio devices (Vidgren, 2013). It would result in unauthorized and unauthenticated actions of the devices. The light designs of the ZigBee would result in the interception of the data packets for the targeted networks. The ZigBee devices could be tampered without contacting the physical access to the system. Key Attacks: The keys used for connecting the two devices can be easily decrypted because of low security structure (Vidgren, 2013). The combination of hardware and software applications would result in doing the illicit operations from the devices. The device would not be required to be in physical access for performing the key attacks. The pre shared keys and OTA processes are used for connecting the devices using systematic methodologies. Conclusion The report has covered the impact of the wireless technologies for the development of the communication system. The WiMax technologies protocols (PKMv2, EAP, and AES) have been compared in the above report. The security challenges of WPAN technologies are Inferior Security protocol, Denial of Service, Injection and replay attacks, and Key Attacks. References Amiri, I. S., Alavi, S. E., Idrus, S. M., Nikoukar, A., Ali, J. (2013). IEEE 802.15. 3c WPAN standard using millimeter optical soliton pulse generated by a panda ring resonator.IEEE Photonics Journal,5(5), 7901912-7901912. Desai, P. (2013).U.S. Patent No. 8,526,348. Washington, DC: U.S. Patent and Trademark Office. Kalra, M. S., Kiran, M. V. (2015). Research and Analysis of WiMax Communication.traffic,4(9). Minar, N. B. N. I., Tarique, M. (2012). Bluetooth security threats and solutions: a survey.International Journal of Distributed and Parallel Systems,3(1), 127 Pawlowski, M. P., Jara, A. J., Ogorzalek, M. J. (2014, July) Extending Extensible Authentication Protocol over IEEE 802.15. 4 Networks InIMIS(pp. 340-345). Sridevi, B., Rajaram, S. (2012). PKMv2EAP authentication cost reduction of mobile WiMAX network entry process by the proposed key caching mechanisms.International Journal of Mobile Network Design and Innovation,4(2), 65-75. Vidgren, N., Haataja, K., Patino-Andres, J. L., Ramirez-Sanchis, J. J., Toivanen, P. (2013, January). Security threats in ZigBee-enabled systems: vulnerability evaluation, practical experiments, countermeasures, and lessons learned. InSystem Sciences (HICSS), 2013 46th Hawaii International Conference on(pp. 5132-5138). IEEE. Wadi, S., Zainal, N. (2013). A low cost implementation of modified advanced encryption standard algorithm using 8085A microprocessor.Journal of Engineering Science and Technology,8(4), 406-415.