Monday, September 30, 2019

The Dilemma of IELTS Test Takers at Preparatory Programs in the UAE: A Call for Lexical-Structural Syllabus Design

————————————————- Doctorate of Education Theoretical Perspectives on Materials and Syllabus Design in TESOL  (DED609) Title: The Dilemma of IELTS Test Takers at Preparatory Programmes in the UAE: A Call for Lexical-Structural Syllabus Design. By: Mohammed A. Molhim Module tutor: Dr. Yasmin yildiz No. of words 000 words Essay Outline * Introduction * Conceptual Framework * IELTS Marking Rubrics: Lexical Resources & Grammatical Range * Lexical Syllabus * Structural Syllabus Selection of Lexical and Grammatical Items in Lexical-structural Syllabus: * Structural Syllabus: Drawbacks * The Structural Syllabus and Grammar Teaching * Suggested Steps to design a Lexical-Structural Syllabus * Conclusion Introduction Standardized test preparation courses such as the International English Language Testing System (IELTS) in preparatory programmes at government and private universities in the United Arab Emirates (The UAE) prepare students to meet their exit score requirement.Curriculum planning has been driven towards these tests. Some research studies (Read and Hayes, 2003) warned against that type of curriculum in that it is restricted to those areas that are to be tested with no balance or integrated skills course design. Curriculum designers therefore depend heavily on materials geared to practice for the required exam. Moreover, Alderson and Hamp-Lyons (1996) argue that these type of curriculum are characterised by ‘teaching to the test’ and even text-book slaves.On the other hand, this essay will argue that designing and implementing curriculum that is supported by materials that reflect and meet the test question types and objectives can be beneficial to students preparing for standardised tests in the UAE. This paper will be outlined as follows: After introducing the conceptual framework of the essay, it will highlight the IELTS’ mark ing criteria of ‘Lexical Resource’ and ‘Grammatical Range’ in the hope to establish the argument that half of the IELTs marking criteria is based on lexical and grammatical items.Then, the type of lexical and structural syllabus that can be proposed to meet students’ needs in enhancing the aspect of English Language accuracy will be described. Some practical guidelines will then be provided for designing a lexical-structural syllabus. Conceptual Framework This essay falls within the conceptual framework of critical theory and critical pedagogy.From a social reconstructionism perspective, critical theory and critical pedagogy call for critically re-addressing status quo issues in education. Paolo Freire (1972), a critical theorist, believes that in most education systems there exists a hidden curriculum that underlines the status quo supported by the dominant culture and thus repressing minority subcultures. Curriculum planning should undergo a consta nt progressive change due to the progressive nature of the country and educational systems in the UAE.Curriculum change at the level of preparatory programmes is an inseparable part of this change since it is observed that research has provided enough evidence see published annually (IELTS, 2011) that in the UAE and other Arab countries where the majority of students and IELTS test takers struggle to reach a level of proficiency matching score band 5. 0 that enables them to proceed to their major.This judgment is supported by professional and formal data provided in Table 1 below which is adapted from the IELTS Annual Review of 2011. These records include a comparison of IELTS results by mother tongue candidates and by country of origin for the many countries using the IELTS tests. Table 1. Mean band score for the most frequent countries or regions of origin Country: The UAE| Listening| Reading| Writing| Speaking| Overall | Academic Module| 4. 9| 4. 8| 4. 7| 5. 4| 5. 0| General Modu le| 4. 3| 3. 5| 4. 3| 4. 9| 4. 3|It is shocking to learn that the UAE with all of its progressive trends in economy and education, coupled with billions of dollars supporting the educational system where ministries of Higher education and Education receive about 22 % of the total budget in the UAE (Ministry of Finance, 2011), is ranked at the bottom of the ranking list in IELTS scores (See Appendix A). This inexplicable fact urgently calls for critical pedagogy in education and in curriculum design in order to problematise the issue and arrive at proper and sustainable solutions.This is why this essay adopts a critical pedagogical approach. Within critical pedagogy paradigm, â€Å"curriculum perspective emphasizes the roles schools and learners can and should play in addressing social injustices and inequality. Curriculum development is not seen as a neutral process. † (Richards, 2001: 118). Similarly, Freire (1972) and Apple (1986) contend that schools do not present equal o pportunities so learners and teachers must be engaged to address important social and personal problems and seek learners’ empowerment.Morris (1995:10), furthermore, argues â€Å"Social injustices and inequality would be central issues in the curriculum. † Accordingly, curriculum designers in the UAE should study at the context in which learners are taught and start to constantly problematise current issues in order to improve their designs. In Applied linguistics, Pennycook (2001: 5) asserts that applied linguistics from a critical pedagogy perspective â€Å"is always concerned how the classroom, text, or conversation is related to broader social cultural and political relations,†.This paper is intended to problematise the issue of curriculum design in the UAE contest in that it seeks to establish that solid elements of lexical-structural syllabus can lead to a better success rate in IELTS. IELTS Marking Rubrics: Lexical Resources & Grammatical Range While ampl e IELTS research studies in university environments is available (see research reports in IELTS. org), there appears to be less research on the impact of Speaking and Writing assessment criteria or IELTS band descriptors on syllabus design.IELTS measures both test candidates’ abilities to produce different sentence structures, and the range and appropriateness of vocabulary. Consequently, lexical resources and grammatical range are regarded as significant constituents of the speaking and writing assessment, since they determine the level of vocabulary and grammar in speaking and writing the test candidates use. Test candidates are rated using detailed descriptors in IELTS. In the Speaking test, these describe spoken performance according to four different criteria: Fluency and Coherence, Lexical resources, Grammatical Range and Accuracy, and Pronunciation.In the Writing test, the descriptors assess candidates in terms of: Task achievement or response, Coherence and cohesion, Lexical Resources, and Grammatical Range and Accuracy (IELTS handbook, 2004: 18-23). It is clear from the speaking and writing assessment criteria that lexical resources and grammatical range constitute half of the assessment. They describe test takers’ level in grammar and vocabulary in the speaking and writing modules in detail. They should therefore occupy a big part of any curriculum design for IELTs preparation syllabus.Accordingly, this essay argues that a balanced lexical-structural syllabus can help in meeting the course objectives and students’ needs of any IELTS preparation course. Lexical Syllabus: Empowering students’ Lexical Resources in IELTS Historically, syllabuses were not lexical but structural. With the advent of the Communicative Approach, new ideas in syllabus design have been introduced with a focus on functions. In 1990, when Willis wrote The Lexical Syllabus, a large amount of attention to the Lexical syllabus surfaced. Willis (1990, P. v i)) identified three major aspects for lexis in lexical syllabus.First, the language to be learned should be somehow graded to make it easier for the learners to understand. Second, the language should be selected carefully without random exposure. Thirdly, the language syllabus should be itemised Over the past thirty years the Communicative Language Teaching (CLT), however, has not emphasized direct instruction of vocabulary or grammar (Laufer 2006). CLT should therefore be regarded as inappropriate for IELTS preparation exam courses and more explicit instruction of lexis and grammar could help students achieve their desired score in IELTS.In fact, according to Zahar, Cobb and Spada (2001), three periods of direct English instruction every week would lead to the incidental learning of only 70 new words a year. Therefore, acquisition of vocabulary through reading must be supplemented by direct instruction, which can be supported by incorporating a lexical syllabus. In addition, the lexical syllabus can make academic English vocabulary needed in IELTS more learnable to lower-level learners.There is also a well established connection between vocabulary knowledge and successful academic reading (Corson 1997; Nation 2001:144-149). Thus, the significance of incorporating lexical syllabus is significantly clear for large-scale high-stakes tests such as IELTS that assess the range of vocabulary exhibited in a student’s writing and speaking (See Appendix A). It should be admitted that producing satisfactory IELTS writing and speaking responses is not achieved by just learning individual vocabulary and grammatical structures.However, lexical items can lead to further enhancing students overall proficiency in IELTS. Some research ((Laufer, 2005; Nation 2001) has proven that lexical resources are the basis for comprehending grammar and lexical meanings. It is also the most important predictor of writing production (Read, 2002) and reading comprehension (Beck et. a l. 1987:147). In the IELTS speaking test, a similar lexical diversity would also be needed as suggested by Read (2005) who found that diverse lexical resources with some sophistication are rated higher.Regarding the adequate vocabulary range for academic success in international standardised tests, researchers (Laufer, 1992; Nation, 2001) argued that students, depending on the genre, need about 3,000 words in order for them to be able to read ungraded academic text and that the minimum word family level is the 3,000 word level needed for reading an unsimplified text. For IELTS reading texts, about 4,000 word families might be needed, 2,000 of General Service List (GSL) and about 570 words from the Academic Word List (AWL) (Coxhead, 1998) and about 1,000 technical words, proper nouns and low frequency vocabulary (Nation, 2001:147).Accordingly, commercially-produced syllabi such as Headway do not provide the wide range of lexical resources needed by the students (Horst, 2005; Lee, 200 7) in order for them to develop their lexis repertoire and to hence get the score required to pass IELTS. Moreover, there is enough suggestive research evidence (See Beaton, Grunederg and Ellis, 1995 – in Nation, 2001) that would indicate that the more vocabulary range manifested in speaking, the higher the score a student would get in writing.This shows that direct learning is in fact both effective and efficient and that the AWL can provide a reasonable target vocabulary for IELTS preparation courses and syllabi. In terms of the relation of grammar and vocabulary, David Wilkins (cited in Lewis, 2000: 8) noted that â€Å"Without grammar little can be conveyed, without vocabulary nothing can be conveyed†. This statement brings to focus the significance of incorporating lexical with a grammatical element when designing a syllabus aiming at enhancing students’ structural language system and accuracy and hence achieving a higher score in IELTS.The following section will shed some light on the significance of developing students’ accuracy through grammatical structures in structural syllabi. Structural Syllabus: Revisiting grammatical syllabus The structural syllabus comprises of a group of grammatical items that are selected and graded according to simplicity and complexity (Nunan, 1988). A structural-lexical syllabus’ principle objective is to help the learners acquire the grammatical structures and vocabulary of the language they are learning.The grammatical structures are usually presented in a certain sequence, for example, present followed by past, or in contrasting pairs, for example, simple present versus simple past (Long and Crookes, 1993). Wilkins (1976) describes this type of syllabus design approach as synthetic in which the various parts of language are separately taught and there is a â€Å"gradual accumulation of the parts until the whole structure of the language has been built up†. (p. 2) Wilkins suggests language is structured into smaller items and units in a structural syllabus and then it is presented discretely.Wilkins argues that this exposes learners to particular samples of language in which one grammatical feature dominates each lesson in the syllabus. This is mainly based on the hypothesis that grammatical and lexical rules are learned in an additive process, by which learners gain complete mastery of each item before a new one is taught (Nunan, 1988). It is hence the learner's task to re-synthesize the grammatical and lexical items that have been presented in a separate way (Wilkins, 1976). An important question raised here is the set of criteria teachers used to select which lexical and grammatical were to be used in the structural syllabus.This will be reviewed in the following sections. Selection of Lexical and Grammatical Items in Lexical-structural Syllabus: Mackey (1965) takes the stance that the lexical items in a structural syllabus are to be selected on the basis of criteria of frequency, coverage, availability, and learnability (White 1988:49-50). In the 1990s, the lexical approach in teaching and learning started to gain formal prominence among many researchers (Willis, 1990; Willis, 1996). As proposed by the lexical approach, a target reservoir of vocabulary is suggested to be learned at a specific level (Willis, 1990; Willis, 1996).These target vocabulary are derived from old corpus analysis of written and spoken English, but this could be regarded now as old-fashioned with the advancement of computerized corpus. However, one view, suggested by Richards (2001:154) is that lexical syllabuses were among the early types of syllabuses to be designed in language teaching. Regarding grammar structure, Mackey also (1965) proposes four criteria for the selection grammatical structures: simplicity, regularity, frequency, and contrastive difficulty.The last item, contrastive difficulty, means that learning some items at an early stage should rese mble the same item acquired in L1 (cited in Wilkins 1976: 6). These views of language selection have been challenged (e. g. , Ellis 2001). due to its lack of empirical experiments. Thus to determining the level of complexity, simplicity, regularity, etc. is almost entirely based on language teachers and syllabus designers’ common sense judgments. This dilemma, addressed in the following section, is one of the major shortcomings of the structural syllabus.Structural Syllabus: Drawbacks A number of limitations have been identified with the structural syllabus. The first shortcoming is drawn from Corder's (1967) â€Å"built-in syllabus† concept in which learners’ acquisition of different grammatical items is based on a natural order. This notion is supported by many researchers (for example, Hyltenstam and Pienemann, 1985). Within the framework of a built-in syllabus, grammatical complexity of a structure is not the reason for the difficulty of learning a structure of a language item.For instance, a common example of Arab Learners’ frequent mistakes is the acquisition of third person â€Å"s† morpheme (Hajjaj, 1999). Even though an average teacher can explain this item very well to Arabic learners, it always poses a challenge to them, which means difficulty or simplicity of language structure doesn’t always guarantee proper learning. This should be taken into serious consideration when designing a lexical-grammatical syllabus for IELTS preparation courses and thus adding meaningful activities that make the structures more memorable and relevant to learners’ needs and levels.The second main negative aspect of the structural syllabus is its lack of language functions. The structural syllabus is a reliable tool for assisting language learners to perfect common grammar rules. However, in terms of sociolinguistics, structural syllabus can prepare learners to be grammatically competent but communicatively incompetent (Jo hnson, 1982). A learner who replies ‘Yes, I do. ’ to ‘Do you mind if I open the window? ’ is a typical example of a learner whose command of English grammar might be ideal yet they are not capable of producing socially appropriate utterances.In other words, the structural syllabus helps learners produce instances of language usage rather than language use (Widdowson, 1978). Accordingly, syllabus designers who consider implementing lexical-structural syllabus need to promote both usage and use in order to avoid turning the language introduced into something meaningless. Socially contextualised and relevant language items introduced appropriately within interactive technique can bridge the gap between use and usage and make grammar teachable and learnable. This will be discussed in the following section. The Structural Syllabus and Grammar TeachingBefore advocating a lexical-grammatical syllabus, it is necessary to first establish the significance of explicit grammar teaching and learning. One debate in second language pedagogy has been about the teachability of grammar. Some scholars have argued against teaching grammar since it leads to only minimal achievement in the acquisition of linguistic competence in English (Krashen, 1982; Krashen and Terrel, 1983; Prabhu, 1987). Others have contended that explicitly teaching formal grammar plays a significant role in the development of the L2 learners' interlanguage system (Rutherford, 1987; Ellis, 1990, 1993).This paper supports the grammarians’ arguments in favor of formal grammar instruction that enhances IELTS’ UAE students and test takers’ accuracy. The first argument is based on studies on the emergence of immersion programs in Canada where many English L1 students study French and thus have been immersed in meaning- focused input in French (Swain, 1985; Swain and Lapkin, 1995). The results of research studies revealed that the majority of students have developed na tive-like receptive skills, but their productive ones are still far from native-like norms.This has therefore suggested that meaning-focused input instruction, which is devoid of any formal grammar teaching, is more likely to result in fossilization. The second argument defending formal grammar instruction derives from research (e. g. , Felix, 1985; White, 1987; Schachter, 1989) that suggests that adult L2 learners cannot have full access to the same acquisition resources as children with L1 do. This makes positive evidence such as formal instruction and corrective feedback.White (1987:105) finds that French learners of English as a second language tend to make sentences like ‘John drank slowly his coffee’ (John buvait lentement son cafe). These types of sentences are grammatically incorrect in English, but acceptable in their language. Those learners receiving positive evidence cannot notice that there are certain rules for adverb position within a sentence in English unless they are taught so by formal grammar instruction, which implies that lexical-structural syllabus can play a decisive role in some formal aspects of L2 learning and thus in IELTs preparation courses.The third argument has been proposed by Ellis (1990, 1993) who argues that formal grammar instruction develops explicit awareness of grammatical elements which hence helps learners acquire implicit knowledge. Ellis believes that the explicit knowledge of grammar instruction facilitates learning in three methods (1993:98). First, it encourages them to monitor their language before and after production. Terrell (1991:61) observes that â€Å"monitoring can apparently interact with acquisition, resulting in learners acquiring their own output† which shows the importance of monitoring in formal language instruction.Second, explicit teaching and learning support the factor of noticing certain elements in the input. Therefore, † if learners know that plural nouns have an â₠¬â€s, they are more likely to notice the —s on the ends of nouns they hear or read in input and also more likely to associate the —s morpheme with the meaning more than one†. (Ellis,1993:98). This example illustrates how specific features of grammar are best learned explicitly.Third, formal and explicit grammar knowledge assists learners in noticing some gaps in their language production. Thus if, for instance, Arab learners learn that verbs take an –s in the third person singular form, they are more likely to notice the gap when adding the third person singular –s or not, which leads to more accurate production later as they produce similar structures. Furthermore, Celce-Murica (1991: 467-468) suggests that formal lexical and grammar teaching can enhance meaning and social function.For instance, drawing attention to the different spatial denotation of the prepositions in and on the learner will â€Å"find it useful to know quite explicitly that à ¢â‚¬Ëœin’ favors the placement of objects in three-dimensional containers and ‘on’ favors the placement of objects on two-dimensional flat surfaces† if provided with formal instruction. Second, in an example of grammar enhancing social functions, Celee-Murcia discusses that learners need to be aware of the different modal auxiliaries uses in polite requests such as the difference between â€Å"Can you open the door? and â€Å"Could you open the door? â€Å". Celce-Murcia and Hilles (1988:4) believe that learners need to study grammar because many of them are to take part in international tests such as IELTS and that â€Å"Typically, a major component of such exams is grammar. Therefore, to give these students an incomplete grounding in grammar, regardless of one's conviction about teaching it, is to do them a great disservice. Students have to know and apply the rules of English grammar in order to do well on such tests. A relatively recent argument pro posed by Ellis (2001) argues that it is a mistake to suppose that learning foreign languages in schools is entirely to promote communication among speakers of different languages. Learning foreign languages has a more valuable end, i. e. promoting intellectual growth. (Ellis 2001:172) thus views learning a foreign language as a means to develop cognitive abilities and that grammar contains knowledge that contributes to learners’ cognitive skills.If one considers all the arguments discussed earlier in this essay claiming that formal teaching of lexical and grammatical items should be an indivisible part of any English classes, structural-lexical syllabus seems indispensible for students preparing for international examination such as IELTS and TOEFL. This is, however, only my conviction within my teaching context and does not entail that curriculum designers and teachers are to revert to old traditional language teaching methodologies such as grammar-translation method. I elie ve that adopting a merely lexical and/or structural syllabus has not survived in language education because they overemphasized the aspect of grammar teaching through many tedious structural drills. I believe that it is unfair to judge that grammar and lexical instruction should be eliminated simply because of insufficiencies of audio-lingual or grammar-translation methods. A well-balanced lexical-structural syllabus can be safely employed, especially in IELTS preparation courses, provided that it is supplemented by motivating and communicative tasksSuggested steps to design a Lexical-Structural Syllabus According to Stern (1983:339-340), there are major differences between English as a second language (ESL) and English as a foreign language (EFL). Accordingly, EFL and ESL students are positioned in different learning conditions. ESL students learn Target Language (TL) in a more supportive setting in that they are more exposed to TL in its natural environment EFL. Considering needs and motivation, ESL students are more required and motivated to communicate with foreigners than EFL students.Thus, ESL students learning needs are definitely not centered on one factor or need. As previously discussed, the majority of Arab students in the UAE are EFL learners who study English in order to pass national exams, such as IELTS. This educational structure of teaching applies in the EFL environment in the UAE. Based on my observations and experience, I found that students in Emirati high schools are also required to learn specific discrete items such as vocabulary and grammatical items without any exposure to communicative tasks that enable them to use these items meaningfully.Unfortunately, only those who wish to pursue their higher education strive to master the grammatical and vocabulary items of their course books in order for them to achieve the required score of the university entrance exams. When taking these conditions into serious consideration, I have come to r ealize the reason why lexical and grammar instruction can, and perhaps should, be an essential component of any curriculum in the Emirati EFL educational system in schools, and this can be possible through the lexical-structural syllabus proposed in this essay.It is argued that (Richards, 2001) old and traditional language teaching methods did not succeed not because they adhered to a structural or lexical syllabus but because the implementation process was too mechanical through dull drills of discrete language items. I believe that a well-designed lexical-structural syllabus proposed in this essay can survive through two types of tasks: consciousness-raising and communicative tasks. Consciousness-raising activities can develop explicit knowledge and communicative tasks improve the implicit knowledge of lexical and grammatical structures (Ellis, 2001).As defined by Ellis (1993:109), consciousness-raising is â€Å"a deliberate attempt on the part of the teacher to make the learners aware of specific features of the L2†. The following task in Table 2 (Ellis, 2001:173) is a straightforward sample of a consciousness-raising (CR) activity that is designed to help learners be conscious of the difference between the prepositions ‘for’ and ‘since’. Table 2. An Example of a CR Problem-solving Task: 1. Here is some information about when three people joined the company they now work for and how long they have been working there.Name Date Joined Length of Time Ms Regan 1945 45 yrs Mr Bush 1970 20 yrs Ms Thatcher 1989 9 mths Mr Baker 1990 (Feb) 10 days 2. Study these sentences about these people. When is â€Å"for† used and when is â€Å"since† used? a. Ms Regan has been working for her company for most of her life. b. Mr Bush has been working for his company since 1970. c. Ms Thatcher has been working for her company for 9 months. . Mr Baker has been working for his company since February. 3. Which of the following sentence s are ungrammatical? Why? a. Ms Regan has been working for her company for 1945. b. Mr Bush has been working for his company for 20 years. c. Ms Thatcher has been working for her company since 1989. d. Mr Baker has been working for his company since 10 days. 4. Try and make up a rule to explain when â€Å"for† and â€Å"since† are used. 5. Make up one sentence about when you started to learn English and one sentence about how long you have been studying English.Use â€Å"for† and â€Å"since†. | It is my argument that if this exercise is supported by a communicative task where learners interact in pairs or with the classroom teacher it would enable them to internalise the target structure and use it in real-life communication. Designing a lexical-structural based syllabus is not a very hard task. There are many resources based on well-established research that can help syllabus designers build up their course (Lewis, 1997a,1997b). This essay offers some s uggestions on how to build a lexical-structural activities and syllabus.First, syllabus designers need to settle a relevant set of structures, vocabulary and different types of collocations (Lewis,1997a) and organise them according to their increasing complexity, starting from simple structures to complex ones. Second, syllabus designers should choose categories of vocabulary items to be learned and sequence the categories according to situational and functional characteristics such as vocabulary related topics such as environment, health, internet, education and so on since IELTS module is commonly based on globally social topics.Third, syllabus designers should integrate the group of vocabulary and structures together into learning objectives to base the units of lexical-structural syllabus. Although this essay advocates the implementation of a lexical-structural syllabus in IELTS preparation course at preparatory programmes in the UAE, it is necessary to admit that an eclectic an d multi-focus syllabus which includes a wide range of components, specifically vocabulary, structures introduced through functions and, situations can allow for a two-sided approach.This can emphasise the importance of systematically learning specific vocabulary and structures and building up linguistic knowledge, and at the same time it can focus on meeting immediate language communicative needs and sociolinguistic and pragmatic competence. Conclusion In my essay, I only propose that lexical-structural syllabus can safely be employed in EFL settings, particularly in the UAE. Previously, it was argued that the majority of EFL students in the UAE must score reasonably high in their university entrance English exams. This condition requires them to learn many grammatical and lexical structures.It is my suggestion that a lexical-structural syllabus can efficiently serve this purpose. Nevertheless, this argument should not be interpreted as a call for a return to old approaches such as the grammar-translation method. What I have attempted to proposed in this essay is two-fold. First, designing a well-balanced external syllabus that adequately matches the learners’ internal syllabus and second, empowering this potential syllabus with innovative learning ideas and tasks discussed earlier, such as consciousness-raising and communicative tasks.I hope my recommendations will breathe fresh life into the body of the proposed lexical-structural syllabus. References Apple, L. 1986. Teachers and texts. New York: Routlege and Kegan Paul. Beck, I. L. , McKeown, M. G. , and Omanson, R. C. (1987). The effects and uses of diverse vocabulary instructional techniques. In M. McKeown and Curtis, M. E. (eds. ) (1987). The Nature of Vocabulary Acquisition. Lawrence Erlbaum Associates: 147 – 163. Celce-Murcia, M. (1991). Grammar pedagogy in second and foreign language teaching. TESOL Quarterly, 25, 45a-480. Celce-Murcia, M. , and Hilles, S. (1988). Techniques and resource s in teaching grammar.Oxford: Oxford University Press. Corder, S. P. (1967). The significance of learners' errors. IRAL, 5, 161-169. Corson, D. 1997. The learning and use of academic English words. Language Learning, 47 (4), 671 718. Coxhead, A. (1998). An Academic Word List. Occasional Publication Number 18, LALS, Victoria University of Wellington, New Zealand. Dixon, R. J. (1977). Modern American English: Book 2. New Edition. New York: Regents Publishing Company, Inc. Ellis, R. (1990). Instructed second language acquisition. Oxford: Basil Blackwell. Ellis, R. (1993). The structural syllabus and second language acquisition. TESOT Quarterly, 27, 91113.Ellis, R. (2001). Grammar teaching-practice or consciousness-raising? In J. C. Richards, and W. A. Renandya (Eds. ), Methodology in language teaching: An anthology of current practice (pp. I 67-174). Cambridge: Cambridge University Press. English Language Services. (1964). English 900. New York: Collier Macmillan. Felix, S. (1985). Mor e evidence on competing cognitive systems. Second Language Research, 1, 47-72. Freire, P. 1972. Pedagogy of the oppressed. New York: Herder and Herder. Hajjaj, A. (1999). Arab students` writing mistakes: Renewing the issue. Dirasat: Human and Social Sciences, University of Jordan, 26. : 621-633. Horst, M. (2005). Learning L2 vocabulary through extensive reading: A measurement study. Canadian Modern Language Review, 61, 355–382. Hyltenstam, K. , and Pienemann, M. (Eds. ). (1985). Modelling and assessing second language acquisition. Clevedon, Avon: Multilingual Matters. IELTS. (2007). IELTS Handbook 2007. Cambridge: USLES. Retrieved on 15/12/2012 from: < http://www. ielts. org/pdf/IELTS_Handbook_2007. pdf>. IELTS. (2011). IELTS Test taker performance 2011. Cambridge: USLES. Accessed 15/12/2012 from .Johnson, K. (1982). Communicative syllabus design and methodology. Oxford. Oxford University Press Krashen, S. (1982). Principles and practice in second language acquisition. Oxford : Pergamon. Krashen, S. , and Ten-el, T. (1983). The natural approach: language acquisition in the classroom. Oxford: Pergamon. Laufer, B. (2006). Comparing focus on form and focus on forms in second-language vocabulary learning. The Canadian Modern Language Review, 63 (1), 149-166. Laufer, B. (1992). How much lexis is necessary for comprehension? In P. Arnaud and H. Bejoint (eds. ) Vocabulary and Applied Linguistics. Macmillan; London. Lee, S-Y. 2007). Revelations from three consecutive studies on extensive reading. RELC Journal, 38, 150–170. Lewis, M. (1997a). Implementing the lexical approach: Putting theory into practice. Hove, England: Language Teaching Publications. Lewis, M. (1997b). Pedagogical implications of the lexical approach. In J. Coady & T. Huckin (Eds. ),  Second language vocabulary acquisition: A rationale for pedagogy  (pp. 255-270). Cambridge: Cambridge University Press. Long, M. , and Crookes, G. (1993). Units of analysis in syllabus design: The case for task. In G. Crookes, and S. M. Gass (Eds. ), Tasks in a pedagogical context (pp. 9-54).Clevedon, Avon: Multilingual Matters. Mackey, W. F. (1965). Language teaching analysis. London: Longman. Ministry of Finance, 2011. Budget Report. Accessed 15/12/2012 . Morris, P. (1995). The Hong Kong curriculum. Hong Kong: Hong Kong University Press Nation, I. S. P. (2001). Learning vocabulary in another language. Cambridge: Cambridge University Press. Nunan, D. (1988). Syllabus design. Oxford: Oxford University Press. Pennycook, A. (2001). Critical Applied Lingistics: A Critical Introduction. Mahwah, New Jersey and London: Lawrence Erlbaum Associates.Pienemann, M. (1985). Learnability and syllabus construction. In K. Hyltenstam, and M. Pienemann (Eds. ), Modelling and assessing second language acquisition. Clevedon, Avon: Multilingual Matters. Prabhu, N. S. (1987). Second language pedagogy. Oxford: Oxford University Press. Read, J. (2002). Assessing Vocabulary. Cambridge: Cambridge Universi ty Press. Read, J. (2005). Applying lexical statistics to the IELTS speaking test. Research Notes, May, 2005. Richards,  J. C. (2000). Curriculum development in language teaching. New York: Cambridge University Press. Rutherford, W. (1987). Second language grammar: Teaching and learning.London: Longman. Schachter, J. (1989). Testing a proposed universal. In S. Gass and J. Schachter (Eds. ), Linguistic perspectives on second language acquisition (pp. 73-88). Cambridge: Cambridge University Press. Soars, J. , and Soars, L. (1991). Headway: Pre- Intermediate. Oxford: Oxford University Press. Stern, H. H. (1983). Fundamental concepts of language teaching. Oxford: Oxford University Press. Swain, M. (1985). Communicative competence: Some roles of comprehensible input and comprehensible output in its development. In S. Gass and C. Madden (Eds. ), Input in Second language acquisition (pp. 235-253). Rowley, MA: Newbury House.Swain, M. and Lapkin, S. (1995). Problems in output and the cogni tive processes they generate: a step towards second language learning. Applied Linguistics, 16, 371-91. Terrell, T. D. (1991). The role of grammar instruction in a communicative approach. Modern Language Journal, 75, 52-63. Van Patten, B. (1992). Second language acquisition research and foreign language teaching, Part I. ADFL Bulletin, 23, 52-55. White, L. (1987). Against comprehensible input: The input hypothesis and the development of second language competence. Applied Linguistics, 8, 95- 110. White, R. V. (1988). The ELT curriculum. Design, innovation and management.Oxford: Basil Blackwell. Widdowson, H. G. (1978). Teaching language as communication. Oxford: Oxford University Press. Wilkins, D. (1976). Notional syllabuses. Oxford:Oxford University Press. Willis, D. (1990). The lexical syllabus: A new approach to language teaching. London: Collins. Willis. J. (1996). A framework for task-based learning. Oxford: Longman. Yalden, J. (1983). The communicative syllabus: Evolution, de sign and implementation. Oxford: Pergamon. Zahar, R. , Cobb, T. and Spada, N. 2001. Acquiring vocabulary through reading: Effects of frequency and contextual richness. The Canadian Modern Language Review, 57 (4), 541-572.Appendix A (Adapted from www. ielts. org) IELTS | Researchers – Test taker performance 2011 Band score information Place of Origin These figures show the mean overall and individual band scores achieved by 2011 Academic and General Training candidates from the top 40 places of origin. Mean band score for the most frequent countries or regions of origin (Academic) Academic| Listening| Reading| Writing| Speaking| OVERALL| Bangladesh| 5. 9| 5. 6| 5. 6| 5. 9| 5. 8| Brazil| 6. 8| 6. 9| 6. 2| 6. 9| 6. 7| China (People's Republic)| 5. 8| 5. 9| 5. 2| 5. 3| 5. 6| Colombia| 6. 2| 6. 4| 5. 7| 6. 4| 6. 2| Cyprus| 6. 4| 5. 9| 5. 7| 6. | 6. 1| Egypt| 6. 3| 6. 1| 5. 8| 6. 3| 6. 2| France| 6. 9| 6. 9| 6. 3| 6. 8| 6. 8| Germany| 7. 0| 6. 6| 6. 4| 7. 2| 6. 8| Ghana| 4. 8| 4. 3 | 5. 7| 6. 5| 5. 4| Hong Kong| 6. 7| 6. 4| 5. 9| 6. 2| 6. 4| India| 6. 4| 5. 6| 5. 8| 6. 2| 6. 1| Indonesia| 6. 6| 6. 3| 5. 9| 6. 3| 6. 4| Iran| 5. 8| 5. 4| 5. 8| 6. 3| 5. 9| Iraq| 5. 7| 5. 2| 5. 4| 6. 2| 5. 7| Italy| 6. 2| 6. 1| 5. 8| 6. 4| 6. 2| Japan| 6. 0| 5. 6| 5. 5| 5. 8| 5. 8| Jordan| 5. 9| 5. 5| 5. 5| 6. 3| 5. 9| Kenya| 6. 7| 6. 1| 6. 6| 7. 2| 6. 7| Korea, South| 6. 2| 6. 1| 5. 4| 5. 7| 5. 9| Kuwait| 5. 3| 4. 9| 4. 8| 5. 6| 5. 2| Libya| 5. 2| 5. 1| 5. 1| 5. 8| 5. 4| Malaysia| 7. | 7. 0| 6. 2| 6. 6| 6. 9| Mexico| 6. 7| 6. 8| 5. 9| 6. 5| 6. 6| Nepal| 6. 3| 5. 8| 5. 7| 6. 0| 6. 0| Nigeria| 6. 1| 6. 0| 6. 2| 7. 0| 6. 4| Oman| 5. 3| 5. 1| 5. 0| 5. 7| 5. 4| Pakistan| 5. 8| 5. 5| 5. 6| 6. 0| 5. 8| Philippines| 7. 0| 6. 6| 6. 2| 6. 8| 6. 7| Qatar| 4. 8| 4. 6| 4. 5| 5. 3| 4. 9| Romania| 7. 2| 7. 0| 6. 2| 6. 8| 6. 9| Russia| 6. 6| 6. 6| 5. 9| 6. 6| 6. 5| Saudi Arabia| 4. 9| 4. 8| 4. 7| 5. 6| 5. 1| Spain| 6. 7| 6. 9| 6. 0| 6. 5| 6. 6| Sri Lanka| 6. 6| 6. 0| 5. 9| 6. 5| 6. 3| Sudan| 5. 9| 5. 7| 5. 5| 6. 2| 5. 9| Taiwan| 5. 9| 6. 0| 5. 5| 5. 9| 5. 9| Thailand| 5. 9| 5. 9| 5. 3| 5. 7| 5. 8| Turkey| 6. 0| 5. | 5. 3| 5. 8| 5. 8| United Arab Emirates| 4. 9| 4. 8| 4. 7| 5. 4| 5. 0| Uzbekistan| 5. 7| 5. 6| 5. 0| 5. 5| 5. 5| Vietnam| 5. 9| 6. 1| 5. 6| 5. 7| 5. 9| Mean band score for the most frequent countries or regions of origin (General Training) General Training| Listening| Reading| Writing| Speaking| OVERALL| Bangladesh| 6. 1| 5. 4| 5. 8| 6. 2| 5. 9| Brazil| 6. 4| 6. 3| 6. 1| 6. 7| 6. 4| China (People's Republic)| 6. 3| 6. 0| 5. 7| 5. 8| 6. 0| Colombia| 5. 7| 5. 7| 5. 6| 6. 0| 5. 8| Egypt| 6. 3| 5. 9| 5. 9| 6. 4| 6. 2| France| 6. 9| 6. 8| 6. 3| 6. 8| 6. 8| Germany| 6. 9| 6. 6| 6. 4| 7. 1| 6. 8| Hong Kong SAR| 6. 7| 6. 4| 5. | 6. 2| 6. 4| India| 6. 3| 5. 7| 5. 8| 6. 2| 6. 1| Indonesia| 6. 7| 6. 2| 5. 9| 6. 3| 6. 3| Iran| 5. 7| 5. 4| 5. 8| 6. 3| 5. 9| Iraq| 5. 7| 5. 3| 5. 5| 6. 3| 5. 8| Italy| 6. 2| 6. 3| 5. 8| 6. 4| 6. 2| Japan| 6| 5. 6| 5. 5| 5. 9| 5. 8| Jordan| 6| 5 . 6| 5. 5| 6. 3| 5. 9| Kenya| 6. 8| 6. 4| 6. 7| 7. 3| 6. 9| Korea, South| 5. 8| 5. 4| 5. 3| 5. 4| 5. 5| Lebanon| 6. 3| 5. 7| 5. 9| 6. 6| 6. 2| Malaysia| 7. 3| 6. 9| 6. 5| 7. 0| 7. 0| Mauritius| 6. 5| 5. 9| 6. 2| 6. 7| 6. 4| Mexico| 6. 3| 6. 3| 6. 0| 6. 6| 6. 3| Nepal| 6. 3| 5. 6| 5. 9| 6. 2| 6. 1| Nigeria| 5. 9| 5. 9| 6. 6| 7. 1| 6. 4| Pakistan| 6. 2| 5. 5| 6. 0| 6. 4| 6. 1|Philippines| 6. 2| 5. 7| 5. 9| 6. 3| 6. 1| Romania| 6. 5| 6. 3| 5. 9| 6. 2| 6. 3| Russia| 6. 4| 6. 3| 6. 0| 6. 4| 6. 3| Saudi Arabia| 4. 6| 3. 8| 4. 4| 5. 0| 4. 5| Singapore| 7. 7| 7. 3| 6. 9| 7. 5| 7. 4| South Africa| 7. 4| 7. 0| 7. 3| 8. 4| 7. 6| Sri Lanka| 6. 3| 5. 7| 5. 8| 6. 3| 6. 1| Taiwan| 6. 3| 5. 8| 5. 8| 6. 2| 6. 1| Thailand| 5. 6| 5. 2| 5. 3| 5. 6| 5. 5| Turkey| 5. 8| 5. 5| 5. 5| 5. 8| 5. 7| Ukraine| 5. 8| 5. 6| 5. 5| 6. 0| 5. 8| United Arab Emirates| 4. 3| 3. 5| 4. 3| 4. 9| 4. 3| United States of America| 8. 0| 7. 6| 7. 7| 8. 6| 8. 0| Venezuela| 6. 3| 6. 3| 6. 1| 6. 4| 6. 3| Vietnam| 5. 8| 5. 6| 5. 7| 5. 7| 5. 8|

Sunday, September 29, 2019

Raising a Child Essay

Both Parents Should Assume Equal Responsibility in Raising a Child A child growing up with both parents and a child growing up in single parent house have significant differences. The well being and development of a child, both psychologically and physically, rely vastly on how well each parent performs their roles. Taking care of a child is not an easy task but it is crucial that both parents assume equal responsibility in raising a child since children gets behaviors, manners from their mother and responsibility and braveness from their father. In a typical house with both parents, father works for income of the family and mother take care of the child so both parents have plenty of time to perform their roles well. For example, a child’s father will work for income to provide the family’s needs whereas a child’s mother will take care of the child for well being. As the result, the child gets care, warmth and wisdom from both parents. These make the child to grow up without any insecurity. Also by having both parents, the child will get the knowledge that only a mother or a father can give. All these factors contribute in raising a strong, healthy and well balanced child. On the other hand, in a typical single parent house since there’s only a person, that person have to be both father and mother at the same time which means supplying the family with resources for surviving and take care of the child. By only having one person doing the job for both parents, always leads to unsuccessful upbringing of a child due to lack of time. For example, a parent who’s working hard to supply the needs for the family won’t have time to take care of the child. As a result, the child will either end up in a day care center, in a friend or relative house who doesn’t give the same amount and quality of warmth and care as a parent can give. Then the child will grow up with insecurity and with weak personality.

Saturday, September 28, 2019

Election of Barak Obama Essay Example | Topics and Well Written Essays - 1000 words

Election of Barak Obama - Essay Example Sen. Obama is for 'affordable, accessible health care for all Americans, builds on the existing health care system, and uses existing providers, doctors and plans to implement the plan'. Economy: He plans to simplify the tax code, so that it provides greater opportunity and relief to Americans, thus resulting in benefits to American workers and export potential of America. To assist in this venture, he plans to increase investments in infrastructure, energy independence, education, research and development. His contention is, while the wages are stagnant for the middle class, the tax cuts are being implemented only for the wealthy and not for providing any relief to the middle class. Foreign Wars: Iraq war epitomizes the differing foreign war policies of the Bush administration and that of opposition. Sen. Obama termed the very concept of Iraq war as wrong in 2002. His contention was, such an invasion would lead to occupation for undetermined length at undermined cost, with undetermined consequences. That's exactly what is happening in Iraq and Afghanistan. Sen. Obama plans to adopt a policy based on the bipartisan Iraq Study Group led by James Baker and Lee Hamilton. Energy Plan and the Environment: Sen. Obama has taken a lead in pushing ahead a comprehensive energy policy. Having found common ground on CAFE, renewable fuels, and clean coal, the duo of Obama-Biden plan to provide short-term relief to American families facing pain at the pump, put 1 million Plug-In Hybrid cars and ensure 10 percent of US electricity comes from renewable sources by 2012, and 25 percent by 2025, amongst many other initiatives. Illegal Immigration: Sen. Obama has been instrumental in crafting comprehensive immigration reforms in the country. As per the studies undertaken, since 2000 there has been an increase of about 40 percent in undocumented immigration in US. This proves not only a threat for safety and security of the country, but it also proves to be a big drain on the resources of the country. Sen. Obama's contention is, 'politicians have used the immigration issue to divide the country instead of finding a permanent solution'. This is resulted in an increase in cases of illegal immigration. Sen. Obama plans to have secure borders by working in close coordination with countries like Mexico, improving the immigration system remove the apparent incentives for entering illegally. The political impacts that might happen on the following three demographic groups are; Social: Though it might not be a big issue in the elections, but the fact that Sen. Obama is set to become the first black President of US. This is bound to translate in better social status for minorities. Endorsement of Sen. Obama by the erstwhile Bush Confident Collin Powell signifies the importance of this emerging social equation once the elections are over. Being a youthful president (certainly so, as compared to Sen. John McCain), Sen. Obama could prove to be a role model for the youth in the country. Having an unblemished record is bound to help the new incumbent to the top post in bringing about a harmonious social order in the country. If Obama is able to make it, he will be one of the youngest persons with the responsibility. The age factor has made him the favorite candidate for the top slot. Obama has also made it a point to see that the job losses experienced by the youth on account of

Friday, September 27, 2019

Two Cases briefs Case Study Example | Topics and Well Written Essays - 1000 words

Two Cases briefs - Case Study Example In this regard, it is essential to state that there is similar size of the competing firms, which are giving the same service, thus undifferentiated business strategy or service by the companies increases the competition among them as well. Threat of new entrants is medium because if any general industry launches itself then there are low barriers but in terms of a target market there are large barriers. However, it can be said that a slow industry also means that there is less chance of new entrees to emerge. The capital requirement to launch such company is low, which makes new entrees to emerge more frequently. The presence of offline matchmakers makes the threat of substitute high. There are other social networking sites like Face Book, where people are able to find their compatible mates. As there are low switching costs so people may use these traditional methods of dating more than the online match making companies. Moreover, as the company is providing an undifferentiated product so the threat is high. As magnitude of substitute products are high and there are low switching costs so it can be said that the bargaining power of buyers is high. Moreover, mostly people are more prices sensitive which makes them more inclined towards bargaining. The buyer volume is high which makes the customers dictate prices of the services. e-Harmony uses a business framework in which the customers first need to make their profile on the site. Company limits the number of results per day so that the judgment errors are reduced. There is selective filtering of the customers according to their marital status and poor personality profile. Moreover, customer’s behavior is analyzed and there are recommendation systems that provide connections to people of their self-interest. The company continues to improve their services by using Five Factor psychological model, which

Thursday, September 26, 2019

Describe a SPECIFIC room Essay Example | Topics and Well Written Essays - 500 words

Describe a SPECIFIC room - Essay Example There is multimedia equipment also present in the room and is put at the top, close to the ceiling, because it is a very expensive item and can get damaged. There are about 6 rows and each row has six chairs. Thus the class can accommodate more than 30 students. The desks are also movable but are vey heavy to actually be moved around. There is a computer lying in one corner on which multimedia slides are run. The door is on the right top corner of the room and is big enough to let 3 people pass at a time. The windows are full length both on the right and the left. The right ones overlook the garden, while the left ones open in the hallway. Lighting is considered an important component of good classroom design and attention has been paid to this. There is adequate artificial lighting that complements natural light coming from big windows. The classroom is roomy, adequately illuminated and clean. Interestingly there is only one door for such a big classroom. This must be because of the architecture and also because a back door can make it easier for students to sneak out. There is rostrum where teachers make their lectures but no teacher stands still behind the rostrum. They keep moving around and pacing the room to make the class more interested in the subject.

Altar Cross, 12th century Research Paper Example | Topics and Well Written Essays - 1250 words

Altar Cross, 12th century - Research Paper Example The history of Altar Cross is associated with the Abbey of Bury Saint Edmunds. The Altar Cross is the only handy item of religious significance which contains brief historic record and expression of the followers. The five pieces of walrus tusk integrate to form Altar Cross which contains ninety-two figures and ninety-eight inscriptions. The inscriptions on the Altar Cross revealed the hatred shared by Jews against Jesus; this cross contains certain statements and inscriptions against Jesus. The historic facts indicate that strong resentment which prevailed among the dwellers in England, and is evidence of the anti-Semitism in the English society. The origin of this cross is with the time frame of 12th century, because it was in 13th century when the Jewish were expelled from England. The Altar Cross was reunited with the central plague in fourteenth-century. A group of historian believe that Altar Cross has Catalan or Aragonese origin. The paintings of the few Italians in the period of Medieval and Renaissance confirmed the existence of the crosses in the churches. These crosses were installed in the churches as mark of respect for Jesus. The Altar Cross has been â€Å"installed upon pedestal in the centre of the altar" (Benson, 2003); this position is regarded because of its supreme importance. The cross is widely popular among the followers, and is regarded as "simple in design and inexpensive, or most elaborate and valuable" (Benson, 2003). The Altar Cross depicts the history of Christianity, and the brutality experienced by the Christians under Jewish command. Christianity has remained victim of desolation, terror, abuse and anguish; the Altar Cross is the symbolic representation of all these acts of violence faced by Christians and validates the vigour, zeal and courage with which the community fought and emerged victorious. The inexpensive Altar Cross is made of "wood, brass, bronze, copper and pewter" (George, 2003). However with

Wednesday, September 25, 2019

Database Systems Essay Example | Topics and Well Written Essays - 1000 words

Database Systems - Essay Example Likewise, every new version bundled with the database, can easily be upgraded with the latest one, enabling enterprises to enhance web technologies and service oriented architecture (SOA) (, Oracle Forms). Industries that can benefit from this technology involves Financial institutions, Stocks and bonds, Communications, Aerospace, Manufacturing, Retail, Healthcare, Legal, Government and Educational institutes. Furthermore, Oracle Forms assist business developers to create all-inclusive java client applications rapidly, without writing any java codes. Similarly, these applications are created on the basis of rapid application development (RAD) and are optimized for Internet. Of course, java client applications meet and exceed requirements of professional user communities. Furthermore, these web-deployed applications are rich in functionality and available on demand for express processing of large queries and rapid achievement of complex calculations, transactions and analysis. The int egration of builders in â€Å"Oracle forms developer† facilitates business developers to construct complex database forms and business logic robustly with nominal efforts and time. In addition, the developments tools provide powerful features including wizards, drag and drop, and built in menus. Moreover, these powerful features contribute for a creation of fully purposeful applications from database definition with minimum coding in record time. The Oracle forms developer† endow with an open and extensible user interface model, enabling full customization and integrations of applications with Java (, Oracle Developer Tools). To match the pace for the rapidly demands of changing business environment, developments teams are facing challenges, in terms of enhanced application functionality, enhanced user interface and high performance complex configurations. Finally, â€Å"Oracle forms developer† provides a scalable and flexible architecture to deploy and develop h igh performance enterprise solutions to cater business requirements. Furthermore, the existence of integrated delivery environment is operational for Internet applications, to expand and perform by processing thousand of concurrent users (, Oracle Developer Tools). The limitations consist of the GUI functionality that does not work on the forms deployed on the web. For instance, it is not possible to program or modify the cursor style to hourglass. 2 Oracle Reports Oracle reports are an advanced reporting tool used for dynamic and enterprise level reporting. Moreover, it enables businesses to expand and organize information to all levels within in and outside of the organization. It is a component of Oracle fusion middle-ware which is Oracle’s award winning, high-fidelity enterprise reporting tool. In addition, this tool enables businesses to provide instant access to information at all stages in or outside of the organization in an expandable and safe environment. Oracle Rep orts includes Oracle Reports Developer - a prevailing, (WYSIWYG) report design tool and a J2EE 5.0 based Oracle Reports Server. Furthermore, it is a multi-tier architecture to access data sources and develop reports in any format for the web and paper, and to distribute reports to any possible target. Oracle vestiges committed to the development of this technology, and to the continuing release as a component of the Oracle Fusion Middle-ware platform (, Oracle

Monday, September 23, 2019

Problem Formulation and Identification Essay Example | Topics and Well Written Essays - 750 words - 1

Problem Formulation and Identification - Essay Example This reduces the cognitive demands involved in making decisions by restricting the range of issues that must be considered. Typically, past experience in similar situations provides guidance in framing situations. Without prior experiences, decision makers must consider a large array of issues to evaluative standards and derive an appropriate interpretation. Computer supported decision making allows to identity the process of determining what knowledge is relevant. It is made in order to act upon the world, to make sure that the future does not look like the past. This process helps to save time and avoid anxiety, delays in decisions and action. Also, computer supported decision making is about making the best decision at given conditions at the moment; it is specifically about process and only indirectly about outcome. In a computer service support organization, decision makers go to great lengths to insure that they have the ability to control key future events, and controllability is factored into their decisions. The main problem is that observed that corporate decision makers usually rely on their "subjective mode" to make decisions, even when extensive, computerized technology is available. Critics explain that because the databases for deriving probabilities and projecting trends consist of records of past events, the probabilities and trends are "backward looking" and therefore of questionable pertinence to decisions that often concern time frames projecting 20 years or more into the future. A decision making expert system allows managers to solve day-to day problems. By the same token, reliance upon data about the past assumes that the world is static; the data are useful only for predicting what will happen if the future looks a great deal like the past, or if identified trends continue (Decision Making Techniques n.d.). For problem identification and formulation, the organization can use balanced scorecard analysis. One first identifies

Sunday, September 22, 2019

Blowback Article Example | Topics and Well Written Essays - 500 words

Blowback - Article Example However, the above policies changed after learning how harmful such policies could be to the entire world (Johnson pp.6-10). The U.S aimed to restore peace and prosperity after the cold war. Whereby, the U.S established certain bodies to restore peace and prosperity. This idea was embraced by almost entire world after learning how destructive war may turn the world economy (Johnson p.7). 5. Identify one of the pre-2001 blowback incidents Johnson mentions and explain how it relates to core themes of this class. Are there other examples that we have covered that may involve blowback, but are not mentioned in this reading? Some of the blowbacks that faced United States include; terrorist attacks among its innocent citizens. Whereby, the attacks were attributed to the previous imperial acts committed by the U.S to other nations. In addition, some economic policies that united state formulated with an aim of harming other economies turned to affect the U.S. For instance, the 1977 economic meltdown affected Thailand, Indonesia, Korea and other countries were reported to have been caused by America. Those crises were least anticipated (Johnson pp.6-10). Additionally, the drug menace was reported to be a major blowback that affected Americans citizens. The drug problem may was attributed to American acts that were previously committed by corrupt CIA military officers. In addition, the Bombing of American embassies in Nairobi Kenya and Dare salaam in 1988 July was another relevant example of Blowbacks (Johnson pp.10). Another, unmentioned blowback that has not been put forth involves China becoming a super power economy. For instance, China is one of the biggest markets for Americans because most of the items utilize in the United States are imported from China. This indicates that economic policies that were put forth by Americans to benefit them at the

Saturday, September 21, 2019

Women in Greek Mythology Essay Example for Free

Women in Greek Mythology Essay A myth is a legendary traditional story, usually concerning a hero or an event, and typically involving supernatural beings and events. Informally, the term is also used to describe false stories, due to the usual lack of determinable basis or fact in most myths, but the academic use of the word has nothing to do with truth or falsity. Myths are stories woven from the need of having models for behavior. They are sacred stories revolving around sacred events and sacred characters idealized perfectly to be the suitable role-models in the eyes of the society from which they spring, which makes myths a valuable resource for explaining how the human race came to what it is today. Ancient Greek society had very specific gender roles, where men were expected to be controlling and domineering, and women passive and obedient. It was believed that if women were busy in their domestic homes, then they will not turn to their evil nature in which men of that time strongly believed in. â€Å"From her is descended a great pain to mortal men† (Leftowitz and Fant, p25). In Homer’s Odyssey, one of the oldest and most fundamental works of literature to western canon, the importance of women in the poem’s plot lies in their roles as seductresses. When Odysseus crew arrives on Circes island, they are attracted to Circes house because of the alluring voice of the beautiful but monstrous goddess. Homer describes her as singing in a sweet voice, as she fared to and fro before the great web imperishable, such as is the handiwork of goddesses, fine of woof and full of grace and splendor. (Homer, 850 BC) But evil seductresses was not the only portrait of women offered by Greek Mythology. Penelope, the wife of the main character in the Odyssey, Odysseus, is a prime example of what an ideal wife was in Ancient Greek society. She has only one son by Odysseus, born just before Odysseus was called to fight in the Trojan War. Penelope remained faithful to Odysseus for 20 years as he was away fighting, doing all she can to curb the unwanted attention of many suitors and their requests for her hand. She has devised many plans to delay an answer, one of which was pretending to weave a burial shroud for Odysseus’ old father, and promising to choose which to marry of her suitors when she finishes it. Every night for three years she undid a part of the shroud until her trick was exposed. She is a symbol of fidelity in marriage, even though she begins to get restless and ambivalent, due mainly to Athena’s encouragement, after 20 years of waiting. As Irene De Jong comments: â€Å"As so often, it is Athena who takes the initiative in giving the story a new direction Usually the motives of mortal and god coincide, here they do not: Athena wants Penelope to fan the Suitors desire for her and (thereby) make her more esteemed by her husband and son; Penelope has no real motive . . . she simply feels an unprecedented impulse to meet the men she so loathes adding that she might take this opportunity to talk to Telemachus (which she will indeed do)† (De Jong, p.44) But as Odysseus comes back disguised as a beggar, Penelope vows to marry whoever can string Odysseus Bow and shoot an arrow, which leads to Odysseus and Penelope reuniting together. Penelope’s story shows what Greek men expected from women, undying fidelity and a good, sharp and reliable mind. And albeit the fact that Penelope starts longing to show off for her suitors and eventually agrees to marry whoever strings her former husband’s bow, she is still shown in a good light in Greek myth. On a high contrast to the passive Penelope is Medusa, the gorgon female monster, who is well known for hair of snakes and her horrifying glare that turned onlookers to stone. She was born an exceptional beauty, the jealous aspiration of many suitors, with her hair being her best feature, but after she was ravished in Athena’s temple, the goddess was so enraged she punished her by turning her hair into snakes and whoever looked at her into stone. She was later killed by the hero Perseus, who beheaded her and used her head as a weapon, then gave it up for Athens. Medusa has become a symbol of feminine rage, she was punished for being a victim of rape, while the man escaped with no consequence, and she had spread terror and fright as her revenge for the unfairness of the world, and later is beheaded, and her murderer is labeled a hero, giving her head to the goddess who had started it all with her curse. Interestingly enough, her name means the protector, or the guardian. The most interesting Greek mythical woman in my opinion is Pandora, the beginning of it all. Her name means â€Å"The giver of all†. She was Zeus punishment to mankind after Prometheus stole the secret of fire, the symbol of education. Zeus ordered her to be mould out of the earth, and he and all the other gods joined in offering this â€Å"beautiful evil† all manners of seductive gifts. It is said that she had opened a jar, known in modern days as Pandora’s Box, out of curiosity, and unintentionally released all the evils of mankind, disasters and illnesses and malaises, leaving only hope inside after she hastened to close it. The curious part is how women were viewed not just as a punishment, but a punishment for man’s attempts to broaden his mind and satiate his curiosity, and how the evils of mankind all came to be, not as a result of malice or malevolence, but that same innocent curiosity, which is one of the natural attributes of the human race. It appears as though the Greek did not approve of snooping around, especially of women, which brings to mind the modern stereotype of nosey idle housewives. Her other name is Anesidora, which means â€Å"She who sends up gifts†, implying her lower status as a female. In conclusion, while myths might not describe real events, they are nonetheless one of the most valuable tools to understanding human nature and ideals, they are fantasies that man had created and they reflect his thoughts and theories and explanations and hopes and ideals. Women had took up major roles in the Greek mythical world, as villains and victims, but rarely as heroines, which shows that the society at the time and place of the creation of those legends was dominantly ruled by men, with women staying to their homes and looking after their families. These gender stereotypes have continued for many years after the downfall of the Greek Empire, and are still popular throughout the world even today. References Bulfinch, T. , and Goodrich, N. (1995). Bulfinchs mythology: The age of fable. Plume. De Jong, I. (2001). A Narratological commentary on the odyssey. Cambridge University Press. Retrieved Dec 6, 2009 from http://en. wikipedia. org/wiki/Penelope Definition of Myth. Dictionary. com unabridged. Retrieved (2009, December 6) from http:// dictionary. reference. com/browse/myth Gender in Odyssey. Bookrag. Retrieved Dec 6, 2009 from http://www. bookrags. com/ essay- 2005/11/23/13450/292 Graf, F. , and Marier, Thomas. (1996). Greek mythology. Johns Hopkins Univ Pr. Hesiod, Schlegel, C. , and Weinfield. (2006). Theogony and works and days. University of Michigan Pr. Homer (fl. 850 B. C. ). The Odyssey. The Harvard Classics. 1909–14.. Bartleby. Retrieved Dec 6, 2009 from http://www. bartleby. com/22/10. html Homer, Fagles, R. , and Knox, B. (1998). The Iliad. Penguin Classics. Katz, M. (1991). Penelopes renown: Meaning and indeterminacy in the odyssey. Princeton University Press. Lefkowitz, M. R. , and Fant, M. B. (2005). Men’s Opinion. Women’s life in Greek and Rome. USA: The John Hopkins University Press. Pandora, by Jules Joseph Lefebvre(1836–1911), Oil on Canvas.

Friday, September 20, 2019

African Insurgency Groups: Causes and Responses

African Insurgency Groups: Causes and Responses Daniel Silberstein In response to a spate of violent attacks from the Kenyan capital to the coast President Uhuru Kenyatta has decreed that they â€Å"will not flinch in war against terrorists†, specifically against the Al-Shabaab militant group headquartered in Somalia. His publicly declared position of a robust, aggressive, and continued response against what he refers to as an, â€Å"extremist caliphate† intent on asserting dominance in the region, is certain to be met with both solidarity and criticism amongst Kenyans, Africans, and the global community. Nigeria, home to Africa’s largest economy (according to an April BBC report) also finds itself on the brink of a larger conflict. Flanked by militant insurgency, attributed mostly to the Boko Haram, in the north and the new capital of piracy on its southern shores. The reverberations of these conflicts are uncertain. But, in order to foresee, and perhaps assuage, the consequences of this campaign, and to limit the devastation w e are likely to witness, it is paramount that international interventions adapt and correlations be drawn between this rising contention and contemporary conflicts that define modern warfare. Firstly, this should not be perceived as merely a symptom of the popularized narrative of another African affliction. This is to say that, historically, aggressions were relatively limited in regional scope. This does not downplay the reprehensible past conflicts in Africa: the horrors of genocide – such as Rwanda, Darfur, etc. and entrenched prolonged warfare – such as Mali, Democratic Republic of Congo, etc. This is simply, and necessarily, to illustrate that the ramifications of warfare in Africa is quickly becoming a global hazard. The overwhelming contribution to this crises so far? Money, and quite literally tons of it. A 2009 WSJ article by Dambisa Moyo estimated over $1 trillion in fact. So, while the hopes of assisting in curtailing violence and degradation in the region have existed for decades, through foreign aid and, military and political partnerships, it is apparent that the structures in place for facilitation and management have failed to meet expectations. The current system of aid in Africa has become almost farcical. Broad strokes of assistance have missed the mark at best and have been actively harmful at worst. Much of the governmental fixtures that have grown from the influx of poorly distributed aid have actually stifled the genuine progress of their respective constituencies. Political institutions have propagated mostly as middle-men, profiteering from the flow of aid. In 2013, Transparency International placed all but five Sub-Saharan nations on the bottom half of its corruption rankings list. A new course of action is imperative to foster safety and augment economic growth. A discourse about the patronage of wealthy nations in intelligent intervention and investment is becoming more and more vital. That being said, undeterred by turmoil Africa is on the verge of a new day. Racked between geo-political vestiges of imperialism and vulnerable as potential prey to an aloof globalized economy, the region has desperately been seeking for a foothold of stability since the end of WW2. Despite a gridlock of corruption, sectarian violence, and humanitarian disasters, this century is poised to see African nations propelled into an elevated global status, both politically and economically. Countries like Botswana, Angola, and many others are experiencing an enormous growth in their middle-class sectors, which according to â€Å"The Economist† is projected to equal India’s middle-class sometime in 2015. While not the equivalent of the Western standard for middle-class this, consumer base will exponentially increase the marketability and influence of Africa’s economic bids. The consequences of increased economic pertinence is apparent throughout. A budding group of billi onaires speckle the continent, twenty-nine in fact according to Forbes in March. This is up from twenty only one year earlier. Granted, many are South African or hail from Northern Africa, countries not normally framed with Sub-Saharan Africa, but the proximity itself imparts salience. While functional and profitable large businesses develop, along with a stable middle-class, many African nations’ governments are beginning to politically mature. Even pockets of success from more circumspect aid programs exist, especially with micro-grants and loans to ground-level African entrepreneurs, demining initiatives, and the proliferation of educational opportunities. Considering Africa’s historical failures, and a perhaps tenuous grip upon a wave of rapid development, what are the right answers to best facilitate peace and stability? The necessity of foreign aid and intervention still exists. Reevaluating the distribution and access of aid, and developing prudent intervention strategies to comply with measurable outcomes is the only hope for these nations to surmount the magnitude of adversity that haunts the continent. Invariably, it seems to me, certain criteria must be met before a nation can hope to flourish: security and stability, transparency and accountability, and the development of business and infrastructure. While these guidelines are by no means exclusive of one another, nor strictly chronological in implementation. However, some semblance of this order is necessary, especially considering the familiar detachment of government policies to the populations they manage. The regression of the security situation, particularly Nigeria and Kenya the rising stars of self-reliance, threatens to derail these upwardly mobile countries by the very real potential of a conflict whose scope can easily exceed any in African history. The most significant distinction of this rising conflict are the links to a well-funded and ambitious international terrorist culture. Though intelligence is inherently faulty when evaluating extremist groups, links between African insurgency groups and organizations like A l Qaeda and (if not already, certainly soon) ISIS are all but assured. In light of emerging conflicts with borderless extremist organizations, and new found wealth, African defense budgets have soared 65% since 2004, according to The Economist, greater than any other region in that time frame. Almost without fail, since the onset of the Cold War era, ballooning defense budgets are often indicative of impending crises, not only in terms of violence but in the cessation of civil liberties and international instability. To ameliorate this the sale of materiel must follow a strict and discriminatory guideline. This is why the international community must be cohesive and cognizant, even apprehensive, as Kenya and Nigeria embark on their very own â€Å"War on Terror†. Unfortunately, the profit margin for manufacturing in the lucrative arms market is quickly establishing a place in Africa. The same Economist article divulged that â€Å"four major European arms manufacturers have set up African subsidiaries this year†. These will no doubt become e conomic boons but they carry with them the latency of war. One of McNamara’s lessons becomes relevant, â€Å"Proportionality should be a guideline in war†, indeed both in the manner in which it is waged and in the prevention of needless aggression. Problems arise with inflated military spending, the accessibility of war and the justification of expenditures compels nations to treat every problem like a nail with the hammers of automatic rifles. This is the often overlooked criticism of drone warfare. They are often more precise, accurate, and less apt to error than manned machines. A drone pilot in Nevada, overseen by hordes of high-ranking officials and lawyers, is less vulnerable to primal survival instincts and rash decisions. However, accessibility draws us into conflict. When the fear of casualty counts are not smeared on news broadcasts, a sense of invulnerability obfuscates wisdom. In the face of a ravenous enemy it is understandable, though undesirable, that one seeks safety behind the acquisition of arms and muzzle fla shes. Some strides have been made in anticipation of incautious military action. The U.N.’s Forward Intervention Brigade and African Union Peacekeepers have had success in presenting a unified front; the term coalition should be avoided these days to avoid negative connotations. These organizations also lend some transparency to unilateral operations and a more honest assessment of the aftermath of military operations. Obviously these methods of waging war are by no means faultless, it is a step in the right direction. Mutual policing will be fundamental in preventing atrocity. Andrew Muzonzini, the lead for Zimbabwe’s external intelligence agency offers a precocious insight in a Business Insider Article that is in line with the appropriate approach, â€Å"Ahead of time, we should seek to understand (the Islamic State) modus operandi if we are to anticipate and predict challenges ahead†. This conclusion, hopefully shared amongst the milieu of African politics, will (hopefully) be indicative of a circumspect and deliberate course of action to repel extremist behavior. A strong internal defense approach combined with precisely defined and rigidly tailored tactical excursions, targeting only locally substantiated objectives, should be the tenets of this nascent conflict. The global community needs to facilitate such equitable actions. More valuable than financial support, more accurate than high-tech weaponry, we must impart the lessons of an ineffective and prolonged conflict. The manner in which we defend ourselves should not be so broad as to alienate us from the world at large. Africa’s Muslim population’s safety must be assured. Sovereign nations must not be disaffected. And perhaps in the end Africa may edify the global community on how to maintain morality when confronting monsters. What is Online Examination System? What is Online Examination System? Online examinations, sometimes referred as e-examinations, are the examinations conducted through the internet or in an intranet (if within the Organization) for a remote candidate(s). Most of the examinations issue results as the candidate finish the examination, when there is an answer processing module also included with the system. They can be used to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. These examinations are conducted as open-book type examinations. Candidate is given a limited time to answer the questions and after the time expiry the answer paper is disabled automatically and answers is sent to the examiner. The examiner will evaluate answers, either through automated process or manually and the results will be sent to the candidate through email or made available in the web site. Today many organizations are conducting online examinations worldwide successfully and issue results online. There are advantages and disadvantages in online examinations. The main advantage is that it can be conducted for remote candidates and evaluation of answers can be fully automated for Multiple Choice questions and other essay type questions can be evaluated manually or through automated system, depending on the nature of the questions and the requirements. Also online examinations can be conducted at any time and does not incur higher cost as traditional exam scenario as there is no paper work involved(eg: printing exam papers, prepare paper admissions etc) , there is no invigilators, also no need of arrangement of exam centers. When comparing with traditional exam scenario the cost for an online examination will be almost zero after the online exam system is establishment and if maintenance cost is not considered. The disadvantage of the e-examination is the inability of invigilating. There are methodologies used in these examinations, when registering candidates and presentation of questions, so that to test candidates knowledge and skills. However with a limited time, candidate is not capable of totally depend on the reference materials or a supporting person. AIM OF THE PROJECT The aim of this project is to develop an online examination system by applying software engineering principles and best practices. The system will be built using popular Java/J2EE web technologies and framework available for web development. The system will be designed to be scalable, secure and robust. The online examination system will help in speeding up the process of conducting examination. Teachers will be able to create examinations by composing a set of questions. The questions can be multiple choice questions or single (text) answer question. The system will have the ability to automatically process the results of examination based on the question database. The system will have intelligent capabilities to mark the text based answers not only when there is an exact match, but it will also recognize similar answers by finding the synonyms of the words used in the answer. The system will also provide manual override feature where in the teacher can manually mark or update the result for an exam. The system will also have the capability to resume the examination from last save point, i.e., a student can stop the examination in the middle and can start again at any other time. When the student will start the same examination again, the exam will start from the same point where i t was stopped. The system will present a easy to use interface for Teachers, Students and Administrators. Once logged in, students will be able to see the examinations due and can take the examination. CHAPTER 2 BACKGROUND RESEARCH AND ANALYSIS EVALUATION OF EXAMINATION SYSTEM Paper -Based Examination: Paper -based examination are carrried out on fixed days and according to a fixed schedule. Therefore, the absentees rarely have another chance to take up the exam again. Moreover, they involve a lot of paper work (e.g. printing of exam papers, arranging answer sheets, etc ). The evaluation of these exam is also very tedious job,after the students complete their exams, theteacher has to mark each paper manually and then consolidate the result. This process is very cumbersome and takes a lot of time and hard work. Web- Based Examination: With the emergence of online examinations, the World Wide Web opens up the possibility of giving the exams online. The online examination system helps in speeding up the process of conducting examination. Teachers will be able to create examinations by composing a set of questions. The system will have intelligent capabilities to mark the text based answers not only when there is an exact match, but it will also recognize similar answers by finding the synonyms of the words used in the answer. The system will also provide manual override feature where in the teacher can manually mark or update the result for an exam. The system will also have the capability to resume the examination from last save point, i.e., a student can stop the examination in the middle and can start again at any other time. When the student will start the same examination again, the exam will start from the same point where it was stopped. The system will present a easy to use interface for Teachers, Students and Administrators. Once logged in, students will be able to see the examinations due and can take the examination. TECHNOLOGIES RESEARCH Web applications are either service oriented or presentation oriented. A presentation oriented web application involves generally mark up languages (e.g. XML and HTML) with dynamic contents responding to requests. On the other hand, a service oriented web applications implements the endpoint of the web service. Below is an analysis on Postgres, Hibernate, Spring and Wicket used to implement my project. POSTGRES PostgreSQL is an object-relational database management system (ORDBMS) based on POSTGRES,Version 4.2 (http://s2k-ftp.CS.Berkeley.EDU:8000/postgres/postgres.html), developed at the University of California at Berkeley Computer Science Department. The POSTGRES project, led by Professor Michael Stonebraker, was sponsored by the Defense Advanced Research Projects Agency (DARPA),the Army Research Office (ARO), the National Science Foundation (NSF), and ESL, Inc. PostgreSQL is an open-source descendant of this original Berkeley code. It provides SQL92/SQL99language support and other modern features. POSTGRES pioneered many of the object-relational concepts now becoming available in some commercial databases. Traditional relational database management systems (RDBMS) support a data model consisting of a collection of named relations, containing attributes of a specific type. In current commercial systems, possible types include floating point numbers, integers, character strings, money,and dates. It is commonly recognized that this model is inadequate for future data processing applications. The relational model successfully replaced previous models in part because of its simplicity. However, as mentioned, this simplicity often makes the implementation of certainapplications very difficult. Postgres offers substantial additional power by incorporating the following additional concepts in such a way that users can easily extend the system: inheritance data types functions Other features provide additional power and flexibility: constraints triggers rules transaction integrity These features put Postgres into the category of databases referred to as object-relational. SPRING Spring Features Spring is a layered Java/J2EE application platform, based on code published in  Expert One-on-One J2EE Design and Development  by Rod Johnson (Wrox, 2002). Spring includes: The most complete lightweight container, providing centralized, automated configuration and wiring of your application objects. The container is  non-invasive, capable of assembling a complex system from a set of loosely-coupled components (POJOs) in a consistent and transparent fashion. The container brings agility and leverage, and improves application testability and scalability by allowing software components to be first developed and tested in isolation, then scaled up for deployment in any environment (J2SE or J2EE).    A common abstraction layer for transaction management, allowing for pluggable transaction managers, and making it easy to demarcate transactions without dealing with low-level issues. Generic strategies for JTA and a single JDBC DataSource are included. In contrast to plain JTA or EJB CMT, Springs transaction support is not tied to J2EE environments.    A JDBC abstraction layer  that offers a meaningful exception hierarchy (no more pulling vendor codes out of SQLException), simplifies error handling, and greatly reduces the amount of code youll need to write. Youll never need to write another finally block to use JDBC again. The JDBC-oriented exceptions comply to Springs generic DAO exception hierarchy.    Integration with Toplink, Hibernate, JDO, and iBATIS SQL Maps: in terms of resource holders, DAO implementation support, and transaction strategies. First-class Hibernate support with lots of IoC convenience features, addressing many typical Hibernate integration issues. All of these comply to Springs generic transaction and DAO exception hierarchies.    AOP functionality, fully integrated into Spring configuration management. You can AOP-enable any object managed by Spring, adding aspects such as declarative transaction management. With Spring, you can have declarative transaction management without EJB even without JTA, if youre using a single database in Tomcat or another web container without JTA support.    A flexible MVC web application framework, built on core Spring functionality. This framework is highly configurable via strategy interfaces, and accommodates multiple view technologies like JSP, Velocity, Tiles, iText, and POI. Note that a Spring middle tier can easily be combined with a web tier based on any other web MVC framework, like Struts, WebWork, or Tapestry. HIBERNATE Hibernate is popular open source object relational mapping tool for Java platform. It provides powerful, ultra-high performance object/relational persistence and query service for Java. Hibernate lets you develop persistent classes following common Java idiom including association, inheritance, polymorphism, composition and the Java collections framework. The Hibernate Query Language, designed as a minimal object-oriented extension to SQL, provides an elegant bridge between the object and relational worlds. Hibernate also allows you to express queries using native SQL or Java-based Criteria and Example queries. Hibernate is now the most popular object/relational mapping solution for Java. Hibernate maps the Java classes to the database tables. It also provides the data query and retrieval facilities that significantly reduces the development time. Hibernate is not the best solutions for data centric applications that only uses the stored-procedures to implement the business logic in database. It is most useful with object-oriented domain modes and business logic in the Java-based middle-tier. Hibernate allows transparent persistence that enables the applications to switch any database. Hibernate can be used in Java Swing applications, Java Servlet-based applications, or J2EE applications using EJB session beans. Features of Hibernate Hibernate 3.0 provides three full-featured query facilities: Hibernate Query Language, the newly enhanced Hibernate Criteria Query API, and enhanced support for queries expressed in the native SQL dialect of the database. Filters for working with temporal (historical), regional or permissioned data. Enhanced Criteria query API: with full support for projection/aggregation and subselects. Runtime performance monitoring: via JMX or local Java API, including a second-level cache browser. Eclipse support, including a suite of Eclipse plug-ins for working with Hibernate 3.0, including mapping editor, interactive query prototyping, schema reverse engineering tool. Hibernate is Free under LGPL: Hibernate can be used to develop/package and distribute the applications for free. Hibernate is Scalable: Hibernate is very performant and due to its dual-layer architecture can be used in the clustered environments. Less Development Time: Hibernate reduces the development timings as it supports inheritance, polymorphism, composition and the Java Collection framework. Automatic Key Generation: Hibernate supports the automatic generation of primary key for your. JDK 1.5 Enhancements: The new JDK has been released as a preview earlier this year and we expect a slow migration to the new 1.5 platform throughout 2004. While Hibernate3 still runs perfectly with JDK 1.2, Hibernate3 will make use of some new JDK features. JSR 175 annotations, for example, are a perfect fit for Hibernate metadata and we will embrace them aggressively. We will also support Java generics, which basically boils down to allowing type safe collections. EJB3-style persistence operations: EJB3 defines the create() and merge() operations, which are slightly different to Hibernates saveOrUpdate() and saveOrUpdateCopy() operations. Hibernate3 will support all four operations as methods of the Session interface. Hibernate XML binding enables data to be represented as XML and POJOs interchangeably. The EJB3 draft specification support for POJO persistence and annotations. WICKET Features Swing-like OO Component Model : Pages and Components in Wicket are real Java objects that support encapsulation, inheritance and events. Ease of Development : Because Wicket is Java and HTML, you can leverage what you know about Java or your favorite HTML editor to write Wicket applications. Separation of Concerns : Wicket does not mix markup with Java code and adds no special syntax to your markup files. The worlds of HTML and Java are parallel and associated only by Wicket ids, which are attributes in HTML and Component properties in Java. Since Wicket HTML is just HTML and Wicket Java is just Java, coders and designers can work independently to a large degree and without relying on any special tools. Secure : Wicket is secure by default. URLs do not expose sensitive information and all component paths are session-relative. Explicit steps must be taken to share information between sessions. There are plans for the next version of Wicket to add URL encryption to support highly secure web sites. Transparent, Scalable Clustering Support : All Wicket applications will work on a cluster automatically and without additional work. Once bottlenecks are understood, Wicket enables tuning of page state replication. The next version of Wicket will support client-side models for zero-state scalability. Transparent Back Button Support : Wicket supports configurable page version management. When users submit a form or follow a link from a page they accessed with the back button in their browser, Wicket is able to revert the page object to the state it was in when the page was originally rendered. This means you can write web applications that support the back button with very little work. Multi-tab and multi-window support : Wicket provides an easy way to write application that supports multi-window and multi-tab usage allowing developer to react properly when users open new browser window or tab Reusable Components : Reusable components in Wicket are particularly easy to create. Not only can you extend existing components with the Java extends keyword, but you can also create Panel components which associate a group of components as a reusable unit. Simple, Flexible, Localizable Form Validation : It is trivial to write and use validators in Wicket. It is also quite easy to customize and localize the display and content of validation error messages. Typesafe Sessions : Wicket eliminates the need to manage HttpSession attributes by hand. Page and component objects are transparently stored in the session and your application can create a custom session subclass with typesafe properties as well. All objects stored in the session can automatically participate in clustering replication. Factory Customizable : Wicket is very extensible. Most operations are customizable through factories or factory methods. Detachable Models : Model objects in Wicket can be very lightweight in terms of memory and network use in a cluster. When a model is used, it can attach, populating itself with information from persistent storage. When the model is no longer in use, transient information can be reset, reducing the size of the object. Border Components : Wicket Border components enable the decoration of pages in a reusable fashion. This is especially useful for inheritance of common navigational structures or layout. Support for All Basic HTML Features : Wicket supports image tags, links, forms and everything else that youre used to using in your web application development. Programmatic Manipulation of Attributes : Wicket Components can programmatically change any HTML tag attribute. Automatic Conversions : Once a Form validates, the model can be updated using Wicket converters. Most ordinary conversions are built-in and it is easy to write new converters. Dynamic Images : Wicket makes image use, sharing and generation very easy. Dynamic images can be created by simply implementing a paint method. Pageable ListView : ListViews in Wicket are extremely powerful. You can nest any kind of component in a ListView row, even other ListViews. PageableListView supports navigation links for large lists. Tree Component : Out of the box tree component for navigating and selecting nodes. Localization : HTML pages, images and resource strings can all be localized. CHAPTER-3 REQUIREMENTS AND SPECIFICATIONS The requirement analysis stage consists in collecting and analyzing information about the part of the organization that is supported by the application. This information helps us to identify the users requirements for the new system. This will enable us to define the various functionalities of the new system. The identification of the requirements is important as a system with incomplete functionality can lead to a project failure. 3.1 DATA GATHERING USER IDENTIFICATION Users of the system can be categorized as : Student Teacher Admin(Administrator) FUNCTIONAL REQUIREMENTS The system aims to be an improvement on the existing one, the paper based system by : Fully automated system. Less time and effort consuming. Database should be well maintained with well structured database tables. The system should be scalable. Allow student and teachers to view the available exams. Allow student and teacher to view marks. Allow admin to manage the user system and exam system NON FUNCTIONAL REQUIREMENTS Security : Each user is required to log into the system. This is done using a valid username and password. Login and password should be kept secret. Reliability : The system would be used by more than 200 students in the Computer Science Department, which includes academic and administrative staff. The system should ensure minimum downtime and be able to handle multiple requests. Ease of Use : All the user screens should be easy to use and intuitive. Contact details should be provided in order to get in touch with the administrator. Scalability : It is possible to extend the current features for future use of the system. Performance : The system should have a quick response time . DOMAIN REQUIREMENTS Specific functionality provided to the Admin: Manage User System : Admin can create a new user. Activate/deactivate an existing user.Admin can delete and edit a user. Manage Examination : Admin can edit an exam and assign exam to students. Admin can activate/deactivate any exam. Admin can also delete an exam. Specific functionality provided to the Teacher: Manage Examination : Teacher can create a new exam, edit existing exam. Create questions is one of the important functionality. Question can be textual or it can be single/multiple choice. Mark Exam : Teacher can do the marking of the exam either manually or it can be automated. Specific functionality provided to the Student : Answer Exam : Student can answer the exam assigned. View Point : Student can view the point of a question. He can also view his marks in a particular exam. PROJECT PLANNING Task no. Task Name Duration(days) Comments 1 Project Proposal 4 Deadline 30th September 2010 2 Requirements Specifications Ongoing Identify the users needs. 3 Research For technologies required by the system Ongoing Investigate the technologies to be used, the data structure. Identify important features which can be applied to the project implementation. 4 Architectural Design Ongoing Define different layers of the system and apply appropriate technologies to each layer. 5 Database Design 4 Apply Database schema provided by the School IT support team. Add necessary tables and relationships between them to make the application functional. 6 Prototype 3 Design Mock Interfaces of the application. 7 First Inspection 1 Start on 10th October 2010 8 Design Model 7 Class Diagrams Sequence Diagrams 9 Coding Phase 28 It will include connections to the database server. Develop the interfaces. And implement the functionalities of the system. Deadline 10th December 2010 10 Testing 5 Test all the features of the web application. 11 Final Inspection 1 Start on 20th December 2010 12 Dissertation Ongoing Write the dissertation. 13 Dissertation Submission 1 Deadline 7th January 2011 CHAPTER-4 SYSTEM AND DATABASE DESIGN 4.1 DATABASE DESIGN Table Name Description Answer Answer table is used to save all answer of student and right answer of teacher for each question configuration Configuration is used to save configuration information such as: term condition, mark ratio Examination Examination table is used to save exam Examuser ExamUser table is used to save user Question Question table is used to save question Role Role table is used to save role information studentexamination StudentExamination table is used to save the students which are assigned a particular exam. One student can have many examination and one examination can belongs to many students. user_role UserRole table is used for linking many-to-many relationship between user and role. 4.2 SYSTEM FUNCTION DESIGN At the start of the application , a Welcome Page is displayed. On the left side there are three buttons namely Home, Help and Log in. To log into the application , the user has to press the log in button. It displays a login page. The user is prompted to enter a username and a password. Any wrong login using invalid username and password will generate error message requiring the user to try again. During the user authentication check, the system will determine the type of user (admin, student,teacher) and redirect the user to the correct page with appropriate features. ADMINPAGE If the user logged in is admin, then Adminpage shows up. It has the following links Manage Examination : Admin can manage the Examination System. It can view all the examinations created. The Admin can assign students the exams. Manage User : Admin can manage the User System. This is used to manage the user data. Admin can create a new user, edit an existing , delete a user, enable / disable a user. Configuration : This is used to change the configuration of the exam like terms conditions and the marks ratio. ROLE OF ADMIN CREATE USER When the admin opts to create a new user, he inputs the user information like firstname, lastname, e-mail , username, password, course, role in the user management system. There it is checked whether the user exists or not, and the user information entered is valid or not. If it is valid it is saved into the database. Otherwise, an error message is displayed. ACTIVATE/DEACTIVATE A USER Admin can activate/deactivate any user. For this admin chooses a user from the user system, activate/deactivate the user. Then save it into the database. MANAGE EXAMINATION Admin can assign a particular exam to students. Admin can activate or deactivate any exam. TEACHER PAGE If the user logged in is teacher, Teacherpage shows up. It has the following links : Manage Examination : This is used to manage the existing exams in the database. A teacher can edit exam, create questions for a particular exam, view questions of a exam and mark a exam manually. Create Question : This is used to create question. A question can be textual, single choice or multiple choice. A teacher can also edit the existing questions in the database. Create Examination : This is used to create a new exam. Help : This is to help the teacher in creating a question. ROLE OF TEACHER CREATE EXAM When the teacher opts to create an exam, he inputs the exam name, duration of the exam, description of the exam, mark type into the exam system. There it is checked whether exam name exists or not, duration of the exam is valid or not. If all is valid it is saved into the data base otherwise an error message is returned back to the teacher. A teacher can also edit the existing exam in the database. CREATE QUESTION When the teacher opts to create a question for an exam. He chooses the exam from the exam system and creates a question for it. In the question management system it is checked whether the question content is correct or not. If it is correct, it is saved into the database otherwise an error message is returned to the teacher. MARK MANUALLY When the teacher opts to mark an exam manually, he chooses the exam to be marked from the exam system. He iterates each question and marks them. Then he saves the marks into database. STUDENT PAGE If the user logged in is a student, studentpage shows up. It has the following link : View Point : This is used to view the point assigned to a particular student. Answer Exam : This is used to answer the exam assigned to the student. ROLE OF STUDENT VIEW MARKS A student can view his marks in any exam . ANSWER AN EXAM A student can answer any particular exam assigned to him. He can view point assigned to a question also. INTERFACE DESIGN Figure: Welcome Screen This is the Welcome Screen of our application. On the left hand side there are three buttons : Home, Help, Log in. These enable the user to get to Home Page, Help and Log in helps the user to get logged into the system. The same header and footer will be applicable to every page to preserve the consistency and integrity of the application. We use the ApplicationContext.xml file to define some Java beans like dataSource, SessionFactory, etc so that we can retrieve them in the application. In this way we can reimplement the classes and use alternatively different implementations by just changing the configuration in the ApplicationContext.xml file. Once you have a sessionfactory, your application asks the factory for a session. Your application will use Hibernate sessions to manage the persistent objects. An application context configuration file is created for the entire application named applicationcontext.xml destroy-method=close> ${hibernate.dialect} ${hibernate.show-sql} ${hibernate.hbm2ddl-auto} I need to define a web.xml File contextConfigLocation classpath:application-context.xml;classpath:security-context.xml org.springframework.web.context.ContextLoaderListener Deploying the application will create a database called exam as shown below in the Figure CHAPTER 5- IMPLEMENTATION AND TESTING APPLICATION IMPLEMENTATION Create User By Admin CreateUser.java String firstName = firstNameModel.getObject(); String lastName = lastNameModel.getObject(); String email = emailModel.getObject(); String course = courseModel.getObject(); ExamUser user = new ExamUser(); user.setUsername(username); user.setPassword(passwordEncoder.encodePassword(password, null)); user.setFirstName(firstName); user.setLastName(lastName); user.setEmail(email); user.setCourse(course); String selectedRoleName = roleModel.getObject().trim(); userService.createUser(user); Manage User By Admin ManageUser.java List> columns = new ArrayList>(); columns.add(new PropertyColumn(new Model(ID), id) { @Override public String getCssClass() { return numeric; } }); columns.add(new PropertyColumn(new Model(